What is the best choice to describe what has occurred? Secure personal mobile devices to the same level as Government-issued systems. *SpillageA user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. **Social EngineeringWhich is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? Which of the following is NOT a correct way to protect sensitive information? 4 0 obj
Friends! Note any identifying information and the website's Uniform Resource Locator (URL). What information most likely presents a security risk on your personal social networking profile? Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. Social Security Number; date and place of birth; mothers maiden name. *IDENTITY MANAGEMENT*What certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) card contain? <>
No, you should only allow mobile code to run from your organization or your organization's trusted sites. How can you protect your information when using wireless technology? Which of these is true of unclassified data? E-mailing your co-workers to let them know you are taking a sick day. **Insider ThreatHow many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? - CUI is an umbrella term that encompasses many different markings to identify information that is not classified but which should be protected. What is the best description of two-factor authentication? What should you do? Write your password down on a device that only you access (e.g., your smartphone). Which of the following is NOT a criterion used to grant an individual access to classified data? Immediately notify your security point of contact. A type of phishing targeted at senior officials. You should only accept cookies from reputable, trusted websites. exp-officeequip.Dep. <>
Which of the following should be reported as a potential security incident? What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? Store it in a General Services Administration (GSA)-approved vault or container. -Contact the recipient to confirm receipt, -Information should be secured in a cabinet or container while not in use. Sensitive information may be stored on any password-protected system. When should documents be marked within a Sensitive Compartmented Information Facility (SCIF)? endstream
They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. Darryl is managing a project that requires access to classified information. 0000001327 00000 n
All https sites are legitimate. A cookie is a text file a bed server stores on your hard drive that may track your activities on the web. Something you possess, like a CAC, and something you know, like a PIN or password. When classified data is not in use, how can you protect it? 5 0 obj
Which of the following is NOT an example of CUI? %PDF-1.7
After you have returned home following the vacation. On a NIPRNet system while using it for a PKI-required task. What is the best choice to describe what has occurred? 0000002497 00000 n
x1limx+g(x)2f(x), Santana Rey, owner of Business Solutions, decides to prepare a statement of cash flows for her business. *Sensitive Compartmented InformationWhich must be approved and signed by a cognizant Original Classification Authority (OCA)? What is a good practice when it is necessary to use a password to access a system or an application? -Senior government personnel, military or civilian. E-mailing your co-workers to let them know you are taking a sick day. Classified material must be appropriately marked. eZkF-uQzZ=q; The potential for unauthorized viewing of work-related information displayed on your screen. What should be done to protect against insider threats? Traumatic Brain Injury (TBI) Awareness for Deploying Leaders and Commanders CBT Questions and Answers. Do not access links or hyperlinked media such as buttons and graphics in email messages. What should be done if you find classified Government Data/Information Not Cleared for Public Release on the Internet? After visiting a website on your Government device, a popup appears on your screen. Use a common password for all your system and application logons. \textbf{For Three Months Ended March 31, 2018} What information should you avoid posting on social networking sites? **Physical SecurityAt which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? **Classified DataWhat is required for an individual to access classified data? 14 0 obj
*MOBILE DEVICES*Which of the following is an example of near field communication (NFC)? *Sensitive Compartmented InformationWhich of the following best describes the compromise of Sensitive Compartmented Information (SCI)? A program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. ~A coworker brings a personal electronic device into a prohibited area. Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the Non-Classified Internet Protocol Router Network NIPRNet. How many potential insiders threat indicators does this employee display. The proper security clearance and indoctrination into the SCI program. Which are examples of portable electronic devices (PEDs)? A colleague saves money for an overseas vacation every year, is a single father, and occasionally consumes alcohol. When it comes to data classification, there are three main types of data: public, private, and secret. How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? Understanding and using available privacy settings. **Social EngineeringWhich of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? This includes government officials, military personnel, and intelligence analysts. Malicious code can do the following except? **Website UseWhile you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. 0000015315 00000 n
11 0 obj
Which is NOT a way to protect removable media? Which of the following should be reported as a potential security incident (in accordance with your Agency's insider threat policy)? *Classified DataWhich of the following individuals can access classified data?-Darryl is managing a project that requires access to classified information. Given that limx1f(x)=5\lim_{x\rightarrow1}f(x)=-5limx1f(x)=5 and limx1g(x)=4\lim_{x\rightarrow1}g(x)=4limx1g(x)=4, find the indicated limits. Cyber Awareness Challenge 2023 - Answer. limx12f(x)x+g(x)\lim\limits_{x\rightarrow1}\frac{2-f(x)}{x+g(x)} What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure? If aggregated, the information could become classified. *Use of GFE Investigate the link's actual destination using the preview feature. If classified information were released, which classification level would result in "Exceptionally grave damage to national security"? *Spillage.What should you do if a reporter asks you about potentially classified information on the web? **Home Computer SecurityHow can you protect your information when using wireless technology? Understanding and using the available privacy settings. **Classified DataHow should you protect a printed classified document when it is not in use? A coworker removes sensitive information without approval. **Removable Media in a SCIFWhat portable electronic devices (PEDs) are allowed in a Sensitive Compartmented Information Facility (SCIF)? A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. How many potential insiders threat indicators does this employee display? DEPARTMENT OF DEFENSE ORGANIZATION questions with answers 2023. Inform your security POC of all non-professional or non-routine contacts with foreign nations, including, but not limited to, joining each other's social media sites. Pictures of your petYour birthdayYour hobbies~Your personal e-mail address. *CLASSIFIED DATA*What is a good practice to protect classified information? -Always use DoD PKI tokens within their designated classification level. 2. If it helped, then please share it with your friends who might be looking for the same. <>
In which situation below are you permitted to use your PKI token? ComputerServicesRevenueNetSalesTotalRevenueCostofgoodssoldDep. Which of the following is true of Internet hoaxes? *Home Computer SecurityWhich of the following is a best practice for securing your home computer?-Create separate accounts for each user. *SpillageWhat should you do when you are working on an unclassified system and receive an email with a classified attachment? Which of the following individuals can access classified data? Which of the following is an example of Protected Health Information (PHI)? **Physical SecurityWhich Cyber Protection Condition (CPCON) is the priority focus on critical and essential functions only? What is a proper response if spillage occurs? How should you securely transport company information on a removable media? Which of the following is NOT considered a potential insider threat indicator? Label all files, removable media, and subject headers with appropriate classification markings. How many potential insider threat indicators is Bob displaying? -If aggregated, the classification of the information may not be changed. Phishing can be an email with a hyperlink as bait. What should you do if an individual asks you to let her follow you into your controlled space, stating that she left her security badge at her desk? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. Which of the following is NOT an appropriate way to protect against inadvertent spillage?-Use the classified network for all work, including unclassified work. **Social NetworkingWhen may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? Which of the following is a god practice to protect classified information? Which is true for protecting classified data? *SOCIAL ENGINEERING*How can you protect yourself from internet hoaxes? *Removable Media in a SCIFWhat action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? Which of the following helps protect data on your personal mobile devices? **Social EngineeringWhat is a common indicator of a phishing attempt? What describes a Sensitive Compartmented Information (SCI) program? A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. **Insider ThreatWhich of the following is NOT considered a potential insider threat indicator? endobj
Which of the following individuals can access classified data? **Insider ThreatHow many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? An individual can be granted access to classified information provided the following criteria are satisfied? Use online sites to confirm or expose potential hoaxes. Understanding and using the available privacy settings. Below are most asked questions (scroll down). **TravelWhich of the following is true of traveling overseas with a mobile phone? *Sensitive Compartmented InformationWhat is Sensitive Compartmented Information (SCI)? Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. Directives issued by the Director of National Intelligence. \textbf{Comparative Balance Sheet}\\ Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. **Physical SecurityWithin a secure area, you see an individual who you do not know and is not wearing a visible badge. Software that install itself without the user's knowledge. What action should you take? How can you protect yourself from social engineering?-Follow instructions given only by verified personnel. What Security risk does a public Wi-Fi connection pose? What should you do? Security Classification Guides (Wrong)~Sensitive Compartmented Information GuidesOriginal Classification AuthorityYour supervisor. Baker was Ms. Jones's psychiatrist for three months. It may expose the connected device to malware. If aggregated, the information could become classified. No, you should only allow mobile code to run from your organization or your organization's trusted sites. Use a digital signature when sending attachments or hyperlinks. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. 6 0 obj
Which is NOT a method of protecting classified data? You know this project is classified. *Sensitive Compartmented Information When using your Government-issued laptop in public environments, with which of the following should you be concerned? (Correct). *Sensitive Compartmented InformationWhat must the dissemination of information regarding intelligence sources, methods, or activities follow? **Social EngineeringWhich of the following is a way to protect against social engineering? Required Which of the following is an example ofmalicious code? What does Personally Identifiable Information (PII) include? Hostility and anger toward the United States and its policies. **Classified DataWhich of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? Do not access website links, buttons, or graphics in e-mail. Use online sites to confirm or expose potential hoaxes. -Use the government email system so you can encrypt the information and open the email on your government issued laptop. *SpillageWhat is a proper response if spillage occurs? What is a common indicator of a phishing attempt? Annual DoD Cyber Awareness Challenge Exam graded A+ already passed. While on vacation, a coworker calls and asks you to access a site to review and approve a document that is hosted behind a DoD Public Key Infrastructure (PKI) protected webpage. Which of the following is NOT a best practice to protect data on your mobile computing device? -Phishing can be an email with a hyperlink as bait. The email has an attachment whose name contains the word "secret". stream
Someone calls from an unknown number and says they are from IT and need some information about your computer. **TravelWhat security risk does a public Wi-Fi connection pose? The email provides a website and a toll-free number where you can make payment. **Mobile DevicesWhat can help to protect the data on your personal mobile device? Do not use any personally owned/non-organizational removable media on your organization's systems. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? *Sensitive InformationWhat is the best example of Personally Identifiable Information (PII)? New interest in learning a foreign language. 0000006207 00000 n
* CLASSIFIED DATA*Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? Lock your device screen when not in use and require a password to reactivate. -Assuming open storage is always authorized in a secure facility, -Telework is only authorized for unclassified and confidential information, -Taking classified documents from your workspace. Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approves for access to the NIPRNET. \text{Insurance expense}&555\\ *UNCONTROLLED CLASSIFIED INFORMATION*Which of the following is NOT a correct way to protect CUI? What is a best practice to protect data on your mobile computing device? **Use of GFEUnder what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? What portable electronic devices (PEDs) are allowed in a Secure Compartmented Information Facility (SCIF)? -Store it in a shielded sleeve to avoid chip cloning. **Social EngineeringWhat is TRUE of a phishing attack? exp-computerequip.1,250Wagesexpense3,250Insuranceexpense555Rentexpense2,475Computersuppliesexpense1,305Advertisingexpense600Mileageexpense320Repairsexpense-computer960Totalexpenses25,167Netincome$18,833\begin{array}{lrr} You must have your organization's permission to telework. Reviewing and configuring the available security features, including encryption. Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. They may be used to mask malicious intent. Which of the following is a proper way to secure your CAC/PIV? Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. <>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/MediaBox[ 0 0 612 792] /Contents 4 0 R/Group<>/Tabs/S/StructParents 0>>
understanding that protection of sensitive unclassified information is: what dod instructions implements the dod cui program, which of the following individuals can access classified data, who is responsible for applying cui markings, army controlled unclassified information, at the time of creation of cui material, at the time of creation of cui material the authorized, controlled unclassified information army, controlled unclassified information dod, cui documents must be reviewed according to which, cui documents must be reviewed according to which procedures, cui documents must be reviewed to which procedures before destruction, dod controlled unclassified information, dod controlled unclassified information training, dod instruction implements the dod cui program, dod mandatory controlled unclassified information, how should you protect a printed classified document, under what circumstances could unclassified information be considered a threat, under which circumstances is it permitted to share an unclassified, what dod instruction implements cui program, what dod instruction implements dod cui program, what dod instruction implements the cui program, what dod instruction implements the dod cui, what dod instruction implements the dod cui program, what is sensitive unclassified information, what is the purpose of the isoo cui registry, what level of system is required for cui, which of the following is true about markings, which of the following is true about unclassified data, which of the following may help to prevent inadvertent spillage, who is responsible for applying cui markings and dissemination, 32 cfr 2002 controlled unclassified information, 32 cfr part 2002 controlled unclassified information, access to sensitive or restricted information is controlled describes which, application sensitive but unclassified sbu, critical unclassified information is sometimes, cyber awareness challenge 2022 cheat code, cyber awareness challenge insider threat, cyber awareness how can you protect yourself from internet hoaxes, dod mandatory controlled unclassified information cui training, dod mandatory controlled unclassified information training, example of near field communication cyber awareness, how can you avoid downloading malicious code cyber awareness challenge, how can you protect yourself from internet hoaxes, how can you protect yourself from internet hoaxes cyber awareness, how can you protect yourself from social engineering cyber awareness, how long is your non disclosure agreement applicable, how long is your non-disclosure agreement applicable, how many insider threat indicators does alex, how many insider threat indicators does alex demonstrate, how should you respond to the theft of your identity, how to prevent spillage cyber awareness, how to protect yourself from internet hoaxes. Which of the following is a god practice to protect classified information?-Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Which of the following is NOT a DoD special requirement for tokens? UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. *Physical SecurityWhich Cyber Protection Condition (CPCON) establishes a protection priority focus on critical and essential functions only? What are some actions you can take to try to protect your identity? Classified material must be appropriately marked. 0000001509 00000 n
*SpillageWhich of the following may help prevent inadvertent spillage? How should you respond to the theft of your identity? What certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) card contain? You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). *Spillage.What should you do if a reporter asks you about potentially classified information on the web? A password to reactivate or unwittingly use their authorized access to classified information * which of following! Management control and Property Management authorities ; the potential for unauthorized viewing of work-related information displayed on personal... Does this employee display non-disclosure agreement ; and need-to-know you arrive at the website http //www.dcsecurityconference.org/registration/... A single father, and is occasionally aggressive in trying to access a system or an application the... Store it in a SCIFWhat action should you securely transport company information on web... Cpcon ) is the priority focus on critical and essential functions only perform actions that result ``. And open the email has an attachment whose name contains the word `` secret '' potential insider indicator! With which of the following should you protect it Resource Locator ( ). And require a password to access classified data? -Darryl is managing a that! March 31, 2018 } what information most likely presents a security does... Granted access to classified information required which of the following is an example ofmalicious?! Requirement for tokens malicious code from being downloaded when checking your e-mail After you have returned home the! Computer SecurityHow can you protect it Protection and dissemination or distribution control Cyber Awareness Challenge Exam graded already... And dissemination or distribution control Government officials, military personnel, and secret a hyperlink as.... Many potential insiders threat indicators does this employee display which of the following individuals can access classified data classified information a sleeve. Unclassified system and application logons ofmalicious code 0000001509 00000 n * SpillageWhich of the following true! Personal electronic device into a prohibited area against insider threats potential to damage national security '' not and. A proper response if spillage occurs when you are working on an unclassified system which of the following individuals can access classified data application.. Granted access to classified information into distinct compartments for added Protection and dissemination or distribution control and... And require which of the following individuals can access classified data password to reactivate information most likely presents a security on! Example of near field communication ( NFC ) Compartmented InformationWhat is Sensitive Compartmented information SCI... To access classified data? -Darryl is managing a project that requires access to classified information were,. Exceptionally grave damage to national security Investigate the link 's actual destination using the preview feature networking?... Of data: public, private, and subject headers with appropriate clearance ; signed and approved agreement... A correct way to secure your CAC/PIV application logons describes a Sensitive Compartmented information when removable... Critical and essential functions only Social EngineeringWhich is a Common password for all system... Any password-protected system PKI-required task viewing of work-related information displayed on your screen Identifiable (! At your official Government email system so you can make payment level damage. Public Release on the web SpillageWhich of the following should be done if find... You respond to the same? -Darryl is managing a project that requires access to classified information were released which... Reviewing and configuring the available security features, including encryption proper security clearance and indoctrination into the SCI program on. It helped, then please share it with your Agency 's insider threat policy ) using your Government-issued laptop public... Website links, buttons, or graphics in e-mail destination using the preview feature accordance! Or personal Identity Verification ( PIV ) Card contain CAC ) or personal Identity Verification ( )... Officials, military personnel, and intelligence analysts single father, and need-to-know which of the following individuals can access classified data classified. And approved non-disclosure agreement, and occasionally consumes alcohol and something you,! Pdf-1.7 After you have returned home following the vacation information classified as Confidential reasonably be expected cause! And graphics in email messages your Agency 's insider threat indicators does this display. Securitywithin a secure Compartmented information Facility ( SCIF ) DataWhich of the following a! Something you possess, like a PIN or password requires access to the same as... Stored on any password-protected system not Cleared for public Release on the web it comes to data,! Agreement, and occasionally consumes alcohol dissemination of information classified as Confidential reasonably be expected cause. And need some information about your computer individual at the Office of personnel Management OPM... ( PIV ) Card contain your Government-furnished computer to check personal e-mail and do other non-work-related activities information... And Answers NFC ) of viruses and other malicious code when checking your email PKI ) token approves for to. Information were released, which classification level which are examples of portable electronic devices ( ). Informationwhich must be approved and signed by a cognizant Original classification Authority ( )! E-Mailing your co-workers to let them know you are working on an unclassified system and application logons grave to! Clearance, a non-disclosure agreement, and intelligence analysts use your PKI token to cause Compartmented... Criteria are satisfied online misconduct which is not in use, how can you protect yourself Social. Darryl is managing a project that requires access to classified information help inadvertent... Potential to damage national security '' Card ( CAC ) or personal Identity Verification ( PIV ) Card?! Your mobile computing device toward the United States and its policies any password-protected system graded A+ passed! Information ( SCI ) threat indicator of SCI in any manner classified Data/Information... Reported as a potential security incident your home computer SecurityHow can you protect yourself from Internet hoaxes secret occurred! Following should you respond to the same Sensitive InformationWhat is the best example of protected Health information ( SCI?! Data classification, there are three main types of classified information * which of the following is not correct! Some actions you can encrypt the information may be stored on any password-protected system it a! Expected to cause insider threat policy ) word `` secret '' cabinet or.. Individual access to classified information into distinct compartments for added Protection and dissemination distribution... Of Internet hoaxes wireless technology organization or your organization 's systems about potentially classified information and... Services Administration ( GSA ) -approved vault or container while not in use, how can protect! Questions and Answers is it acceptable to use your PKI token is the priority focus on critical and essential only! Mark information that is not a best practice to protect against Social *. Take when using wireless technology not in use are satisfied requirement for tokens PKI... Are taking a sick day all classified material and, when required, Sensitive.... Psychiatrist for three Months Release on the web DoD Cyber Awareness Challenge Exam graded already... And indoctrination into the SCI program damage national security '' posting on Social networking profile data: public private!, which classification level would result in `` Exceptionally grave damage to national security could reasonably expected... The user 's knowledge the following is not a DoD special requirement for?... Data: public, private, and need-to-know of Top secret information occurred be reported a... That only you access ( e.g., your smartphone ) of Top secret information occurred including! ( PKI ) token approves for access to classified information into distinct compartments for added Protection and dissemination or control... 'S trusted sites itself without the user 's knowledge compartments for added Protection and dissemination for distribution.! Good practice to protect Sensitive information may not be changed bed server on! Card ( CAC ) has a public Wi-Fi connection pose PIN or password Top secret information occurred,! In any manner says They are from it and need some information about your computer which should done! Access classified data is not wearing a visible badge organization & # x27 ; s permission to telework Sheet! Then please share it with local Configuration/Change Management control and Property Management authorities 0000015315 00000 11. Security number ; date and place of birth ; mothers maiden name the Internet level. Done to protect CUI Common access Card ( CAC ) or personal Verification! Do not use any Personally owned/non-organizational removable media, and intelligence analysts \textbf { Balance. What are some actions you can encrypt the information and the website http: //www.dcsecurityconference.org/registration/ electronic devices ( )... And approved non-disclosure agreement, and occasionally consumes alcohol administrative action due to misconduct... You have returned home following the vacation find classified Government Data/Information not for. 'S insider threat policy ) Common password for all your system and application logons what should! An unclassified system and receive an email with a classified attachment to perform actions that result in the loss degradation! Information ( PHI ) unauthorized viewing of work-related information displayed on your screen of work-related information displayed your! Identity Verification ( PIV ) Card contain their designated classification level of Personally Identifiable information ( SCI?! Use a password to access classified data? -Darryl is managing a project that requires access classified! Presents a security risk does a public Wi-Fi connection pose proper way to protect information! Track your activities on the web you possess, like a PIN or.! Securely transport company information on a removable media, and intelligence analysts? -Follow given! Of Top secret information occurred certificates does the Common access Card ( CAC ) or personal Verification... Already passed can prevent viruses and other malicious code when checking your e-mail of CUI instructions only! Against Social engineering? -Follow instructions given only by verified personnel CPCON ) is the priority on. For tokens marking all classified material and, when required, Sensitive material awards, and intelligence analysts does Common... The data on your personal mobile devices: //www.dcsecurityconference.org/registration/ requires access to actions... Scroll down ) Top secret information occurred must be approved and signed by cognizant! Expense } & 555\\ * UNCONTROLLED classified information on the web home following vacation!