Retrieve classified documents promptly from printers. How many potential insider threat indicators does this employee display? the act of publicly documenting and sharing information is called. What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure? A company assigns overhead cost to completed jobs on the basis of 120% of direct labor cost. (Malicious Code) Which of the following is NOT a way that malicious code spreads? The general policy is to have the contractor furnish the equipment needed. What is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? *Sensitive Information Which of the following is the best example of Personally Identifiable Information (PII)? \text{Expense}&(l)&\text{Credit}&\text{Debit}\\ Submission Service reopen dates published. Sign up to get the latest information about your choice of CMS topics. You should remove and take your CAC/PIV card whenever you leave your workstation. (social networking) When may you be subjected to criminal, disciplinary, and/or administrative action due to online misconduct? What should you do after you have ended a call from a reporter asking you to confirm potentially classified information found on the web? Follow policy for using personally-owned computer peripherals with government furnished equipment (GFE): Permitted Monitors, with the following conditions: Connected via Visual Graphic Array (VGA), Digital Video Interface (DVI), High Definition Multimedia Interface (HDMI), or DisplayPort No other devices connected to the monitor (Spillage) Which of the following is a good practice to aid in preventing spillage? What actions should you take prior to leaving the work environment and going to lunch? Not correct. A coworker has asked if you want to download a programmers game to play at work. 0, 1, 2, or 3+. Correct. Calculate the margin of safety in terms of sales revenue. You are logged on to your unclassified computer and just received an encrypted email from a co-worker. What should Sara do when using publicly available Internet, such as hotel Wi-Fi? Bob, a coworker, has been going through a divorce, has financial difficulties and is displaying hostile behavior. Which designation includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? What action should you take? You must have permission from your organization. Correct. Her badge is not visible to you. What security risk does a public Wi-Fi connection pose? Which of the following is NOT one? You must have your organizations permission to telework. ) A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. **Classified Data Which of the following must you do before using and unclassified laptop and peripherals in a collateral environment? Use the government email system so you can encrypt the information and open the email on your government issued laptop. Maybe Classified material must be appropriately marked. c. Report it to security. We use technology readiness levels (TRL) to give an indication of an innovation. Of the following, which is NOT a problem or concern of an Internet hoax? You know this project is classified. What should you do? Correct. correct. You are reviewing your employees annual self evaluation. A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. Don't assume open storage in a secure facility is authorized. Which of the following is true of traveling overseas with a mobile phone. When is it okay to charge a personal mobile device using government-furnished equipment (GFE)? *Sensitive Compartmented Information Which must be approved and signed by a cognizant Original Classification Authority (OCA)? What portable electronic devices (PEDs) are permitted in a SCIF? not correct. **Social Networking Which of the following information is a security risk when posted publicly on your social networking profile? %PDF-1.7 When can you check personal e-mail on your Government-furnished Cyber Awareness Challenge Complete Questions and Answers What is the total manufacturing cost assigned to Job 413? Being cognizant of classification markings and labeling practices are good strategies to avoid inadvertent spillage. (Spillage) What should you do when you are working on an unclassified system and receive an email with a classified attachment? This information will only be used for the purposes for which it is provided to us. d) Vertical; can be either greater than or less than the natural level of real output. Article - Billing and Coding: Category III Codes (A56902) Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only? You can apply for funding via a themed competition or the Open Call for Innovation. You must have your organizations permission to telework. Always use DoD PKI tokens within their designated classification level. Remove security badge as you enter a restaurant or retail establishment. Government furnished property is a bit of an umbrella term. correct. (Spillage) What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? **Social Networking Which piece if information is safest to include on your social media profile? The Contractor shall use Standard Form 1428 for Inventory Disposal. Controlled Unclassified Information: (Victim) Select the information on the data sheet that is personally identifiable information (PII) but not protected health information (PHI). *Insider Threat Which of the following is a reportable insider threat activity? After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. Which of the following is true of Sensitive Compartmented Information (SCI)? SPA for subcontractors is permitted only when . Home Computer Security (Evidence): Antivirus alert. What should you consider when using a wireless keyboard with your home computer? Lock your device screen when not in use and require a password to reactivate. Do not access website links, buttons, or graphics in e-mail. (Malicious Code) A coworker has asked if you want to download a programmers game to play at work. Use the classified network for all work, including unclassified work. Malicious Code (Spread): How can you avoid downloading malicious code: a. **Classified Data What is required for an individual to access classified data? Software that installs itself without the users knowledge c. A firewall that monitors and controls network traffic. Correct HTKo1[05R4I)RJU=,erh"swJ-k{fo^f^``rf@g]8/u W} @;%m[=jo#UzAk/^)-weH+fX*miP\h6x~0%Agmzw@ 8p2=x"?|ON(K\4n#ikux>mKN|7+>e{yd( 3*aH l+m,t~$ =gP}HN)/xO?y^m\.G!$;\tOE :Q not correct Update or Remind me later? What should you do? Based on the description that follows, how many potential insider threat indicator(s) are displayed? **Insider Threat Which of the following should be reported as a potential security incident (in accordance with you Agencys insider threat policy)? Then select Submit. You must possess security clearance eligibility to telework. A system reminder to install security updates b. You may also provide to us a Limited Rights Version where we agree it is useful to include background information relevant to the evaluation/understanding of the deliverables. DOD Cyber Awareness 2022 Knowledge Check Flashcards | Quizlet PII includes, but is not limited to, social security numbers, date and places of birth, mothers maiden names, biometric records, and PHI. endstream endobj 1073 0 obj <>stream A coworker uses a personal electronic device in a secure area where their use is prohibited. Which of the following statements is true? 7bqM8>EM3:N2/YX-4}Y>9> (Wrong). OR-2020-013. (Spillage) Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? lock Which of the following is NOT a potential consequence of using removable media unsafely in a Sensitive Compartmented Information Facility (SCIF)? a. **Identity Management Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. a. Birthday - Friends Only While it may seem safer, you should NOT use a classified network for unclassified work. P2P (Peer-to-Peer) software can do the following except: Allow attackers physical access to network assets. They can be part of a distributed denial-of-service (DDoS) attack. Press release data. The email states your account has been compromised and you are invited to click on the link in order to reset your password. When is it okay to charge a personal mobile device using government-furnished equipment (GFE)? *Classified Data A personally owned device approved under Bring Your Own Approved Device (BYOAD) policy must be unenrolled while out of the country. What should be your response? **Mobile Devices Which of the following helps protect data on your personal mobile devices? We expect our suppliers to maintain the highest standards of integrity and professionalism in their business dealings and adhere to the laws of the countries where they operate. Avoid attending professional conferences. **Classified Data When classified data is not in use, how can you protect it? Adversaries exploit social networking sites to disseminate fake news. When checking in at the airline counter for a business trip Decline so that you maintain physical contact of your Government-issued laptop. What level of damage to national security can you reasonably expect Top secret information to cause if disclosed? On a NIPRNET system while using it for a PKI-required task.
Peter Bartlett Structural Engineer,
Lisa Lopes Children,
Articles P