Its classification level may rise when aggregated. We thoroughly check each answer to a question to provide you with the most correct answers. What type of attack might this be? **Insider Threat What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? Do not access website links in e-mail messages. Which of the following includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? How can you guard yourself against Identity theft? Secure .gov websites use HTTPS What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)? When gases are sold they are usually compressed to high pressures. Follow procedures for transferring data to and from outside agency and non-Government networks. Controlled Unclassified Information (CUI): Controlled Unclassified information was defined in the Executive Order 13556 as information held by or generated for the Federal Government that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations and government-wide policies that isn't classified The potential for unauthorized viewing of work-related information displayed on your screen. What should you do? **Physical Security What is a good practice for physical security? What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF. How many insider threat indicators does Alex demonstrate? Click the card to flip Flashcards Learn Test Match Created by Jamie_Lancaster Terms in this set (24) How do you respond? Store it in a General Services Administration (GSA)-approved vault or container. A type of phishing targeted at high-level personnel such as senior officials. correct. You believe that you are a victim of identity theft. Were mitochondria as abundant in human epithelial cells as in onion epidermal cells (procedure 4.6)? Only paper documents that are in open storage need to be marked. **Insider Threat Which of the following is NOT considered a potential insider threat indicator? Never allow sensitive data on non-Government-issued mobile devices. When unclassified data is aggregated, its classification level may rise. As long as the document is cleared for public release, you may share it outside of DoD. Which of the following should be done to keep your home computer secure? UNCLASSIFIED - CLASSIFICATION MARKINGS FOR TRAINING PURPOSES ONLY Marking in the Electronic Environment Short Student Guide Center for Development of Security Excellence Page 4 UNCLASSIFIED - CLASSIFICATION MARKINGS FOR TRAINING PURPOSES ONLY IM and Chat Instant messages and chats are brief, text-based message exchanges and conversations. CUI may be stored only on authorized systems or approved devices. A coworker has asked if you want to download a programmer's game to play at work. Public service, notably service in the United States Department of Defense or DoD, is a public trust. You receive an inquiry from a reporter about potentially classified information on the internet. CPCON 5 (Very Low: All Functions). (Sensitive Information) Which of the following is true about unclassified data? A Identification, encryption, and digital signature. They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. cyber-awareness. Which is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF). (Sensitive Compartmented Information) What describes how Sensitive Compartmented Information is marked? I may decide not to consent to these terms, but, if I do not consent to all of these terms, then I agree not to proceed with creating an account or moving forward with filling out the application, and I understand that I will not be . c. ignoring a tantrum Quizzma is a free online database of educational quizzes and test answers. (Home computer) Which of the following is best practice for securing your home computer? How Do I Answer The CISSP Exam Questions? E-mailing your co-workers to let them know you are taking a sick day. Insiders are given a level of trust and have authorized access to Government information systems. Classified material must be appropriately marked. DOD Cyber Awareness 2021 (DOD-IAA-V18.0) Know, RT202: Ch. A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Select the information on the data sheet that is protected health information (PHI). You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). Validate all friend requests through another source before confirming them. Be aware of classification markings and all handling caveats. Federal agencies routinely generate, use, store, and share information that, while not classified, still requires some level of protection from unauthorized access and release. Read the latest news from the Controlled Unclassified Information (CUI) program. Which of the following is NOT a potential insider threat? Which of the following is an example of removable media? Hostility or anger toward the United States and its policies. Store it in a locked desk drawer after working hours. You are working at your unclassified system and receive an email from a coworker containing a classified attachment. cyber-awareness. Federal agencies routinely generate, use, store, and share information that, while not meeting the threshold for classification as national security or atomic energy information, requires some level of protection from unauthorized access and release. Which of the following is true of telework? Examples are: Patient names, Social Security numbers, Drivers license numbers, insurance details, and birth dates. What action should you take? At EPA, the CUI Program is housed in the Libraries and Accessibility Division (LAD) within the Office of Mission Supports (OMS), Office of Enterprise Information Programs (OEIP). Ensure proper labeling by appropriately marking all classified material. *Social Networking A colleague asks to leave a report containing protected health information (PHI) on his desk overnight so he can continue working on it the next day. Which of the following is an example of Protected Health Information (PHI)? When leaving your work area, what is the first thing you should do? 1.1.5 Controlled Unclassified Information. What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? Correct. It does not require markings or distribution controls. Correct. If possible, set your browser preferences to prompt you each time a website wants to store a cookie. Setting weekly time for virus scan when you are not on the computer and it is powered off. 8. Never write down the PIN for your CAC. Thiswill enabletimely and consistent informationsharing andincreasetransparency throughout the Federal government and with non-Federal stakeholders. Please click here to see any active alerts. -It never requires classification markings. Photos of your pet Correct. What should you do? Always check to make sure you are using the correct network for the level of data. You are leaving the building where you work. (controlled unclassified information) Which of the following is NOT correct way to protect CUI? Which of the following is NOT an example of sensitive information? Discuss why gases, such as barbecue propane gas, are sold by mass and not by volume. Which designation marks information that does not have potential to damage national security? What should you consider when using a wireless keyboard with your home computer? A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. **Identity management Which of the following is an example of a strong password? Of the following, which is NOT a problem or concern of an Internet hoax? Not correct be wary of suspicious e-mails that use your name and/or appear to come from inside your organization. Which of the following represents an ethical use of your Government-furnished equipment (GFE)? Which of the following demonstrates proper protection of mobile devices? Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. Based on the description that follows, how many potential insider threat indicator(s) are displayed? Figure 1. Which of the following is true of transmitting Sensitive Compartmented Information (SCI)? NARA has the authority and responsibility to manage the CUI Program across the Federal government. (Sensitive Information) What should you do if a commercial entity, such as a hotel reception desk, asks to make a photocopy of your Common Access Card (CAC) for proof of Federal Government employment? 1 Cyber Awareness Challenge 2023 Answers. Let us have a look at your work and suggest how to improve it! Information should be secured in a cabinet or container while not in use. T/F. How many potential insider threat indicators does this employee display? (Spillage) What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? (Sensitive Compartmented Information) Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)? What is the best choice to describe what has occurred? correct. Unusual interest in classified information. Dont assume open storage in a secure facility is authorized Maybe. Which of the following is NOT a type of malicious code? Based on the description that follows, how many potential insider threat indicator(s) are displayed? **Use of GFE When can you check personal e-mail on your Government-furnished equipment (GFE)? It never requires classification markings, is true about unclassified data. Classified information is defined in PL 96-456, the Classified Information Procedures Act: Classified information that should be unclassified and is downgraded. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Unclassified documents do not need to be marked as a SCIF. Controlled Unclassified Information (CUI) is information that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations, and government-wide policies but is not classified under Executive Order 13526 or the Atomic Energy Act, as amended. It should only be in a system while actively using it for a PKI-required task. **Social Networking Which of the following statements is true? Of the following, which is NOT a method to protect sensitive information? Select the information on the data sheet that is personally identifiable information (PII). All https sites are legitimate and there is no risk to entering your personal info online. Insiders are given a level of trust and have authorized access to Government information systems. **Classified Data When classified data is not in use, how can you protect it? Mobile devices and applications can track your location without your knowledge or consent. Correct. Debra ensures not correct To transmit large payments through Fedwire __________, To regulate and supervise the stock market to provide stability and security to individual investors. Remove security badge as you enter a restaurant or retail establishment. The attributes of identified ground seeds are modified to ground points. 870 Summit Park Avenue Auburn Hills, MI 48057. Q&A for work. Course Introduction Introduction . A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI_________.??? **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? Discrete data involves whole numbers (integers - like 1, 356, or 9) that can't be divided based on the nature of what they are. **Insider Threat How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? Historically, each agency developed its own practices for sensitive unclassified information, resulting in a patchwork of systems across the Executive branch, in which similar information might be defined or labeled differently, or where dissimilar information might share a definition and/or label. Correct. While it may seem safer, you should NOT use a classified network for unclassified work. Which of the following may help to prevent inadvertent spillage? Remove and take it with you whenever you leave your workstation. Which of the following best describes good physical security? What structures visible in the stained preparation were invisible in the unstained preparation? Looking at your MOTHER, and screaming THERE SHE BLOWS! You are logged on to your unclassified computer and just received an encrypted email from a co-worker. #1) Open WEKA and select "Explorer" under 'Applications'. A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI. Upon connecting your Government- issued laptop to a public wireless connection, what should you immediately do? All of these. Information improperly moved from a higher protection level to a lower protection level. correct. Hostility or anger toward the United States and its policies. The date of full implementation of the CUI Program will be announced by the EPAs CUI Senior Agency Official (CUI SAO) and updated here on EPAs public web page. **Identity management Which is NOT a sufficient way to protect your identity? Which of the following is a clue to recognizing a phishing email? (2) War planning documents which contain worldwide -- (a) Planning data and assumptions, (b) Wartime planning factors for the use of nuclear weapons, (c) Intelligence estimates of enemy capabilities, (d) Force composition and development, and **Classified Data What is a good practice to protect classified information? **Social Networking Which of the following is a security best practice when using social networking sites? Which of the following must you do before using an unclassified laptop and peripherals in a collateral classified environment? **Mobile Devices Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Which may be a security issue with compressed Uniform Resource Locators (URLs)? Asked 8/5/2020 6:29:36 PM. internet-quiz. Understanding and using the available privacy settings. An official website of the United States government. John submits CUI to his organizations security office to transmit it on his behalf. Which of the following is true of Internet of Things (IoT) devices? Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? The emission rate of CO 2 from the soils reached the maximum on the 1st day of incubation and the sequence of CO 2 emission rate and cumulative emission under different amendment treatments was as SG > S > G > CK > N (Fig. Search by Subject Or Level. Note That The Integers Should Be Type Cast To Doubles. Matt Monroe, a 20-year U. S. Air Force veteran and current operations manager at Omnistruct, explains the breakdown, "There are four classified information categories in the military based on the severity of damage that the information's release would cause. Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIV) card. c. What similarities and differences are there between plant and animal cells? **Classified Data Which of the following must you do before using and unclassified laptop and peripherals in a collateral environment? Which scenario might indicate a reportable insider threat? Is it permitted to share an unclassified draft document with a non-DoD professional discussion group? Log in for more information. How many potential insider threat indicators does this employee display? Spear Phishing attacks commonly attempt to impersonate email from trusted entities. Of the following, which is NOT an intelligence community mandate for passwords? New interest in learning another language? Unclassified is a security classification assigned to official information that does not warrant the assignment of Confidential, Secret, or Top Secret markings but which is not publicly-releasable without authorization. **Insider Threat What function do Insider Threat Programs aim to fulfill? internet-quiz. The National Archives and Records Administration (NARA) serves as the Controlled Unclassified Information (CUI) Executive Agent (EA). **Social Engineering What is TRUE of a phishing attack? Which of the following is NOT a correct way to protect sensitive information? You must have your organizations permission to telework. There are many travel tips for mobile computing. How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? What should be your response? Which of these is true of unclassified data? Search He has the appropriate clearance and a signed, approved, non-disclosure agreement. You can email your employees information to yourself so you can work on it this weekend and go home now. You must have your organization's permission to telework. **Social Engineering How can you protect yourself from internet hoaxes? Since the URL does not start with https, do not provide your credit card information. UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. Delete email from senders you do not know. The proper security clearance and indoctrination into the SCI program. A coworker has left an unknown CD on your desk. Use online sites to confirm or expose potential hoaxes, Follow instructions given only by verified personnel, Investigate the links actual destination using the preview feature, Determine if the software or service is authorized.