*Sensitive Compartmented Information Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)? **Classified Data What is required for an individual to access classified data? Which of the following is NOT a requirement for telework? When gases are sold they are usually compressed to high pressures. Public service, notably service in the United States Department of Defense or DoD, is a public trust. Research the source to evaluate its credibility and reliability. A smartphone that transmits credit card payment information when held in proximity to a credit card reader. Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. No. Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. Based on the description that follows how many potential insider threat indicators are displayed? What should you do if a reporter asks you about potentially classified information on the web? Use a single, complex password for your system and application logons. When your vacation is over, and you have returned home. This button displays the currently selected search type. Secure .gov websites use HTTPS It includes a threat of dire circumstances. Which of the following is true of the Common Access Card (CAC)? Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF. Ask them to verify their name and office number. cyber. You many only transmit SCI via certified mail. CPCON 3 (Medium: Critical, Essential, and Support Functions) The CUIProgramisan unprecedented initiative to standardize practices across more than 100 separate departments and agencies, as well asstate, local,tribal and, private sector entities; academia; and industry. No, you should only allow mobile code to run from your organization or your organizations trusted sites. Please click here to see any active alerts. Search for an answer or ask Weegy. Insiders are given a level of trust and have authorized access to Government information systems. what should be your response be? The proper security clearance and indoctrination into the SCI program. Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. Transmit classified information via fax machine only Not correct Which of the following is true of the Common Access Card (CAC) or Personal Identity Verification (PIV) card? Which type of information includes personal, payroll, medical, and operational information? Unclassified information is a threat to national security. Senior government personnel, military or civilian. Which of the following statements is NOT true about protecting your virtual identity? However, agency personnel and contractors should first consult their agency's CUI implementing policies and program management for guidance. Which of the following must you do before using an unclassified laptop and peripherals in a collateral classified environment? Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? Correct true-statement. You are logged on to your unclassified computer and just received an encrypted email from a co-worker. What can help to protect the data on your personal mobile device. THIS IS THE BEST ANSWER . A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. As long as the document is cleared for public release, you may share it outside of DoD. While it may seem safer, you should NOT use a classified network for unclassified work. Your health insurance explanation of benefits (EOB). Connect and share knowledge within a single location that is structured and easy to search. Question. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. Reviewing and configuring the available security features, including encryption. What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? Note any identifying information, such as the website's URL, and report the situation to your security POC. Which is a way to protect against phishing attacks? Debra ensures not correct *Malicious Code What are some examples of malicious code? Ask the individual to see an identification badge. Badges must be visible and displayed above the waist at all times when in the facility. Upon connecting your Government- issued laptop to a public wireless connection, what should you immediately do? (social networking) When is the safest time to post details of your vacation activities on your social networking profile? Personal information is inadvertently posted at a website. The website requires a credit card for registration. Original classification authority Correct. (Wrong). Memory sticks, flash drives, or external hard drives. You receive an unexpected email from a friend: I think youll like this: https://tinyurl.com/2fcbvy. What action should you take? (Spillage) Which of the following is a good practice to aid in preventing spillage? How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Q&A for work. What describes how Sensitive Compartmented Information is marked? Correct. **Physical Security Within a secure area, you see an individual who you do not know and is not wearing a visible badge. Note the websites URL and report the situation to your security point of contact. 5. What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)? Carrying his Social Security Card with him, DoD employees are prohibited from using a DoD CAC in card-reader-enabled public device, Assigned a classification level by a supervisor. (social networking) When may you be subjected to criminal, disciplinary, and/or administrative action due to online misconduct? Keeping a database from being accessed by unauthorized visitors C. Restricting a subject at a lower classification level from accessing data at a higher classification level D. Preventing an . Which of the following is true of protecting classified data? Explain. The challenges goal is simple: To change user behavior to reduce the risks and vulnerabilities DoD Information Systems face. We recommend Norton Security or McAfee Total Protection. Only allow mobile code to run from your organization or your organizations trusted sites. *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Added 8/5/2020 8:06:16 PM. A vendor conducting a pilot program with your organization contacts you for organizational data to use in a prototype. The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Linda encrypts all of the sensitive data on her government-issued mobile devices. For Government-owned devices, use approved and authorized applications only. Which piece of information is safest to include on your social media profile? Try this test to determine if it's considered unclassified, classified or protected, and check out tips on what to do and what not to do when working with sensitive information. *Controlled Unclassified Information Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? When is the best time to post details of your vacation activities on your social networking website? Who designates whether information is classified and its classification level? (Spillage) Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? CUI is government created or owned information that requires safeguarding or dissemination controls consistent with applicable laws, regulations and government wide policies. How do you think antihistamines might work? All data transfers via the internet are not 100% secure and there might be some security vulnerabilities. (Insider Threat) Based on the description that follows, how many potential insider threat indicator(s) are displayed? internet-quiz. The date of full implementation of the CUI Program will be announced by the EPAs CUI Senior Agency Official (CUI SAO) and updated here on EPAs public web page. Which of the following is NOT one? Media containing Privacy Act information, PII, and PHI is not required to be labeled. CUI includes, but is not limited to Controlled Technical Information (CTI), Personally Identifiable Information (PII), Protected Health Information (PHI), financial information, personal or payroll information, proprietary data and operational information. What should you do after you have ended a call from a reporter asking you to confirm potentially classified information found on the web? A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. Which of the following is a good practice to prevent spillage. Linda encrypts all of the sensitive data on her government-issued mobile devices. (Identity Management) What certificates are contained on the Common Access Card (CAC)? When vacation is over, after you have returned home. Do not forward, read further, or manipulate the file; Do not give out computer or network information, Do not follow instructions from unverified personnel. When using a public device with a card reader, only use your DoD CAC to access unclassified information, is only allowed if the organization permits it. By Quizzma Team / Technology. DoD Unclassified data: Must be cleared before being released to the public May require applci aton i of Controled l Uncasl sed Iifi nformaton i (CU)I access and distribution controls Must be clearly marked as Unclassified or CUI if included in a classified document or classified storage area *Sensitive Information Under which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? They broadly describe the overall classification of a program or system. Tell us about it through the REPORT button at the bottom of the page. Note That The Integers Should Be Type Cast To Doubles. asked in Internet by voice (265k points) Question : Which of the following is true about unclassified data? Which of the following best describes the sources that contribute to your online identity. For programmatic questions regarding Controlled Unclassified Information (CUI), including any challenges to CUI marked by EPA, pleasecontact EPA's CUI Program Office. Which is a risk associated with removable media? A lock (LockA locked padlock) or https:// means youve safely connected to the .gov website. A colleague asks to leave a report containing protected health information (PHI) on his desk overnight so he can continue working on it the next day. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. correct. Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information? What Are Some Examples Of Malicious Code Cyber Awareness? f. Get an answer. Which of the following definitions is true about disclosure of confidential information? Which of the following is NOT an appropriate way to protect against inadvertent spillage? You find information that you know to be classified on the Internet. What should you consider when using a wireless keyboard with your home computer? *Controlled Unclassified Information Which of the following is NOT an example of CUI? Which of the following is true of transmitting Sensitive Compartmented Information (SCI)? Which of the following is a concern when using your Government-issued laptop in public? -It must be released to the public immediately. Of the following, which is NOT an intelligence community mandate for passwords? Of the following, which is NOT a security awareness tip? Alexa May, director of accounts, received a bill for $648\$648$648, dated April 666, with sales terms 2/10,1/15,n/302/10, 1/15, n/302/10,1/15,n/30. What should the participants in this conversation involving SCI do differently? Which of the following is true of telework? (Identity Management) Which of the following is an example of two-factor authentication? You have reached the office door to exit your controlled area. **Identity management Which of the following is an example of a strong password? Which of the following is a best practice for physical security? Only documents that are classified Secret, Top Secret, or SCI require marking. Spillage because classified data was moved to a lower classification level system without authorization. Correct. **Social Networking As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? Law Enforcement Sensitive (LES),and others. A colleague enjoys playing video games online, regularly use social media, and frequently forgets to secure her smartphone elsewhere before entering areas where it is prohibited. What function do Insider Threat Programs aim to fulfill? Which of the following best describes good physical security? What amount is due if Alexa pays on or betwee n April 222222 and May 666? You must have your organization's permission to telework c. You may use unauthorized software as long as your computer's antivirus software is up to date. Ensure that any cameras, microphones, and Wi-Fi embedded in the laptop are physically disabled.- Correct. Sensitive information. (Spillage) What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? Infographic - Text version Infographic [PDF - 594 KB] Report a problem or mistake on this page Date modified: 2020-12-14 internet-quiz. Your comments are due on Monday. Classified information that should be unclassified and is downgraded. cyber-awareness. CPCON 4 (Low: All Functions) Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. Since the URL does not start with https, do not provide your credit card information. Not correct. **Insider Threat What is an insider threat? Here you can find answers to the DoD Cyber Awareness Challenge. Which of the following does NOT constitute spillage? Rating. **Identity management Which of the following is NOT a best practice to preserve the authenticity of your identity? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Which of the following is not Controlled Unclassified Information (CUI)? To determine premiums for automobile insurance, companies must have an understanding of the variables that affect whether a driver will have an accident. *Sensitive Compartmented Information What is a Sensitive Compartmented Information (SCI) program? Which of the following is true about unclassified data? Exceptionally grave damage to national security. A Common Access Card and Personal Identification Number. A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI_________.??? The Chinese Spy Balloon Showdown The discovery of a Chinese surveillance balloon floating over the United States has added to the rising tensions between the two superpowers. (Spillage) Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. It is created or received by a healthcare provider, health plan, or employer. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? **Removable Media in a SCIF What portable electronic devices (PEDs) are allowed in a Sensitive Compartmented Information Facility (SCIF)? **Identity management What is the best way to protect your Common Access Card (CAC)? 1.To provide opportunities for individuals and businesses to open checking accounts __________, To write rules and guidelines for financial institutions under its supervision __________, To be the lender of last resort for financial institutions __________, To conduct the nations monetary policy with the goals of maintaining full employment and price stability __________, 5. You receive a call on your work phone and youre asked to participate in a phone survey. Use only personal contact information when establishing personal social networking accounts, never use Government contact information. Which of the following is NOT a criterion used to grant an individual access to classified data? **Mobile Devices Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? **Classified Data Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? You check your bank statement and see several debits you did not authorize. *Malicious Code Which of the following is NOT a way that malicious code spreads? What should you do? When can you check personal email on your government furnished equipment? Follow procedures for transferring data to and from outside agency and non-Government networks. Sanitized information gathered from personnel records. Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? Remove and take it with you whenever you leave your workstation. A pop-up window that flashes and warns that your computer is infected with a virus. Classified material must be appropriately marked. On a NIPRNET system while using it for a PKI-required task. Which of the following is NOT a best practice to protect data on your mobile computing device? **Insider Threat How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? What is NOT Personally Identifiable Information (PII)? What should you do? You must possess security clearance eligibility to telework. Which may be a security issue with compressed urls? Which of the following is true of traveling overseas with a mobile phone. Directing you to a website that looks real. Immediately notify your security point of contact. You have reached the office door to exit your controlled area. The CUI Registry is the Government-wide online repository for Federal-level guidance regarding CUI policy and practice.