Which of the following is NOT an example of sensitive information? NARA has the authority and responsibility to manage the CUI Program across the Federal government. Sanitized information gathered from personnel records. Correct. Antihistamines are used to treat the symptoms, such as sneezing, that are due to inflammation caused by irritants in the airways. When is the best time to post details of your vacation activities on your social networking website? Which of the following is true about telework? Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. Correct. UNCLASSIFIED - CLASSIFICATION MARKINGS FOR TRAINING PURPOSES ONLY Marking in the Electronic Environment Short Student Guide Center for Development of Security Excellence Page 4 UNCLASSIFIED - CLASSIFICATION MARKINGS FOR TRAINING PURPOSES ONLY IM and Chat Instant messages and chats are brief, text-based message exchanges and conversations. Spear Phishing attacks commonly attempt to impersonate email from trusted entities. The EPAs Controlled Unclassified Information (CUI) Program issued its Interim CUI Policy in December 2020. After you have returned home following the vacation. There are many travel tips for mobile computing. They broadly describe the overall classification of a program or system. Store classified data appropriately in a GSA-approved vault/container when not in use. (Sensitive Information) Which of the following represents a good physical security practice? Malicious code can mask itself as a harmless e-mail attachment, downloadable file, or website. What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web? You receive an inquiry from a reporter about government information not cleared for public release. However, agency personnel and contractors should first consult their agency's CUI implementing policies and program management for guidance. What does Personally Identifiable Information (PII) include? How many indicators does this employee display? A smartphone that transmits credit card payment information when held in proximity to a credit card reader. What is a best practice for protecting controlled unclassified information (CUI)? *Sensitive Compartmented Information When faxing Sensitive Compartmented Information (SCI), what actions should you take? **Travel Which of the following is true of traveling overseas with a mobile phone? It never requires classified markings, it is true about unclassified data. If aggregated, the classification of the information may not be changed. It is getting late on Friday. Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information? Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know, Insiders are given a level of trust and have authorized access to Government information systems. (Correct) -It does not affect the safety of Government missions. Proactively identify potential threats and formulate holistic mitigation responses. Is this safe? Which of the following is true of using DoD Public key Infrastructure (PKI) token? Use the classified network for all work, including unclassified work. By Quizzma Team / Technology. It includes a threat of dire circumstances. Taking classified documents from your workspace. A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI_________.??? Which scenario might indicate a reportable insider threat security incident? (Spillage) Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? (Malicious Code) Which email attachments are generally SAFE to open? What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? Everything you need to know aboutControlled UnclassifiedInformation(CUI). Which is a risk associated with removable media? What is the best example of Protected Health Information (PHI)? Which of the following personally-owned computer peripherals is permitted for use with Government-furnished equipment? As a security best practice, what should you do before exiting? **Classified Data Which of the following is true of protecting classified data? **Website Use While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. When classified data is not in use, how can you protect it? Which of the following is NOT a social engineering tip? 1).Compared with CK, straw addition treatments (S and SG) significantly (P < 0.01) increased the emission rate and cumulative emission of CO 2 and the cumulative CO 2 . All https sites are legitimate and there is no risk to entering your personal info online. If classified information were released, which classification level would result in Exceptionally grave damage to national security? correct. Which of the following should you NOT do if you find classified information on the internet? **Identity Management Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. Only documents that are classified Secret, Top Secret, or SCI require marking. What is an indication that malicious code is running on your system? Which is a good practice to protect classified information? A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. **Social Networking Which of the following statements is true? Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? Top Secret information could be expected to cause exceptionally grave damage to national security of disclosed. Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. (2) War planning documents which contain worldwide -- (a) Planning data and assumptions, (b) Wartime planning factors for the use of nuclear weapons, (c) Intelligence estimates of enemy capabilities, (d) Force composition and development, and Which of the following is NOT a home security best practice? How many potential insiders threat indicators does this employee display? Not correct. (Correct) -It does not affect the safety of Government missions. A coworker removes sensitive information without approval. Access requires a formal need-to-know determination issued by the Director of National Intelligence.? What should you do? internet-quiz. cyber-awareness. not correct **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? (Malicious Code) While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. **Insider Threat A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Controlled Unclassified Information (CUI): Controlled Unclassified information was defined in the Executive Order 13556 as information held by or generated for the Federal Government that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations and government-wide policies that isn't classified (Spillage) What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? (Sensitive Information) Which of the following is NOT an example of sensitive information? b. (Insider Threat) Based on the description that follows, how many potential insider threat indicator(s) are displayed? Ask for information about the website, including the URL. What describes how Sensitive Compartmented Information is marked? What should be your response? How many potential insider threat indicators is Bob displaying? Which of the following may help to prevent inadvertent spillage? Maybe Software that installs itself without the users knowledge. The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. Someone calls from an unknown number and says they are from IT and need some information about your computer. You find information that you know to be classified on the Internet. Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? Spillage because classified data was moved to a lower classification level system without authorization. Store it in a shielded sleeve to avoid chip cloning. A pop-up window that flashes and warns that your computer is infected with a virus. Follow instructions given only by verified personnel. How many insider threat indicators does Alex demonstrate? (Home computer) Which of the following is best practice for securing your home computer? Only friends should see all biographical data such as where Alex lives and works. Correct. Annual DoD Cyber Awareness Challenge Training, DOD Cyber Awareness Challenge 2019: Knowledge, DOD Cyber Awareness Challenge 2019 (DOD-IAA-V, Operations Management: Sustainability and Supply Chain Management, Elliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson, Anderson's Business Law and the Legal Environment, Comprehensive Volume, David Twomey, Marianne Jennings, Stephanie Greene. This task is performed with the aim of finding similarities in data points and grouping similar data points together. Like the number of people in a class, the number of fingers on your hands, or the number of children someone has. Your cousin posted a link to an article with an incendiary headline on social media. (Identity Management) What certificates are contained on the Common Access Card (CAC)? On a NIPRNET system while using it for a PKI-required task. When would be a good time to post your vacation location and dates on your social networking website? Since the URL does not start with https, do not provide your credit card information. What should be done if you find classified Government Data/Information Not Cleared for Public Release on the Internet? This bag contains your government-issued laptop. Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? true-statement. Remove and take it with you whenever you leave your workstation. ! (A type of phishing targeted at senior officials) Which is still your FAT A$$ MOTHER! Using NIPRNet tokens on systems of higher classification level. Keep your operating system and software up to date: This will help patch any security vulnerabilities in your software. (Malicious Code) A coworker has asked if you want to download a programmers game to play at work. Historically, each agency developed its own practices for sensitive unclassified information, resulting in a patchwork of systems across the Executive branch, in which similar information might be defined or labeled differently, or where dissimilar information might share a definition and/or label. What should be done to sensitive data on laptops and other mobile computing devices? As a security best practice, what should you do before exiting? Search for an answer or ask Weegy. What is NOT Personally Identifiable Information (PII)? The CAC/PIV is a controlled item and contains certificates for: An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? (Correct)-It does not affect the safety of Government missions.-It never requires classification markings. What is the best response if you find classified government data on the internet? You are working at your unclassified system and receive an email from a coworker containing a classified attachment. What is a best practice to protect data on your mobile computing device?