**Identity Management Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. Security Classification Guides (SCGs).??? Use only personal contact information when establishing personal social networking accounts, never use Government contact information. Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? Which is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF). For example, when you buy propane for your barbecue, your tank is placed on a scale while it is filled under high pressure (Figure 7). Phishing can be an email with a hyperlink as bait. P2P (Peer-to-Peer) software can do the following except: Allow attackers physical access to network assets. (Sensitive Information) Which of the following is true about unclassified data? Infographic - Text version Infographic [PDF - 594 KB] Report a problem or mistake on this page Date modified: 2020-12-14 (Spillage) After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. A Common Access Card and Personal Identification Number. What should you do? (Spillage) Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? Memory sticks, flash drives, or external hard drives. A man you do not know is trying to look at your Government-issued phone and has asked to use it. Alex demonstrates a lot of potential insider threat indicators. **Insider Threat Which scenario might indicate a reportable insider threat? How many potential insider threat indicators does this employee display? What certificates are contained on the Common Access Card (CAC)? Who is responsible for information/data security? Correct. A coworker has asked if you want to download a programmer's game to play at work. A passenger in the Land Rover Freelander that T-boned the hatchback said the BMW had been driven out of the unclassified road towards Shipton-under-Wychwood 'like a bat out of hell' - giving . What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web? How do you think antihistamines might work? In setting up your personal social networking service account, what email address should you use? Which of the following should you NOT do if you find classified information on the internet? Search by Subject Or Level. You receive an email from a company you have an account with. Set hasDigit to true if the 3-character passCode contains a digit, Critical, Essential, and Support Functions. Which of the following best describes the sources that contribute to your online identity. CUI was established to standardize the way the Executive branch handles sensitive information that requires dissemination controls. What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered? true-statement. It is created or received by a healthcare provider, health plan, or employer. **Classified Data How should you protect a printed classified document when it is not in use? which of the following is true about unclassified data. Always use DoD PKI tokens within their designated classification level. -TRUE The use of webmail is -is only allowed if the organization permits it Using webmail may bypass built in security features. If possible, set your browser preferences to prompt you each time a website wants to store a cookie. Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? classified-document. What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? What should be done to protect against insider threats? Which of the following is true about unclassified data? -It must be released to the public immediately. difficult life circumstances such as substance abuse, divided loyalty or allegiance to the U.S., and extreme, persistent interpersonal difficulties. They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. *Sensitive Compartmented Information What should the owner of this printed SCI do differently? Store classified data appropriately in a GSA-approved vault/container when not in use. Only friends should see all biographical data such as where Alex lives and works. Since the URL does not start with https, do not provide you credit card information. Let us have a look at your work and suggest how to improve it! Which of these is true of unclassified data? Aggregating it does not affect its sensitivyty level. Confirm the individuals need-to-know and access. Correct. When expanded it provides a list of search options that will switch the search inputs to match the current selection. Which of the following is NOT an example of Personally Identifiable Information (PII)? Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. Which method would be the BEST way to send this information? Using webmail may bypass built in security features. **Physical Security At which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? tell your colleague that it needs to be secured in a cabinet or container. Ask for information about the website, including the URL. not correct Unclassified is a security classification assigned to official information that does not warrant the assignment of Confidential, Secret, or Top Secret markings but which is not publicly-releasable without authorization. Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. Which of the following best describes wireless technology? Classified information that should be unclassified and is downgraded. Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. -TRUE What action is recommended when somebody calls you to inquire about your work environment or specific account information? Ive tried all the answers and it still tells me off. What should you do? **Home Computer Security Which of the following is a best practice for securing your home computer? A colleague saves money for an overseas vacation every year, is a . Access requires a formal need-to-know determination issued by the Director of National Intelligence.? not correct What should be your response? **Classified Data Which of the following must you do before using and unclassified laptop and peripherals in a collateral environment? classified-document. Based on the description that follows, how many potential insider threat indicator (s) are displayed? Always take your CAC when you leave your workstation. Maintain visual or physical control of the device. When would be a good time to post your vacation location and dates on your social networking website? This task is performed with the aim of finding similarities in data points and grouping similar data points together. Which of the following individuals can access classified data? Follow the steps enlisted below to use WEKA for identifying real values and nominal attributes in the dataset. Upon connecting your Government- issued laptop to a public wireless connection, what should you immediately do? Only paper documents that are in open storage need to be marked. Which of the following is a reportable insider threat activity? Linda encrypts all of the sensitive data on her government-issued mobile devices. Which of the following is true about telework? A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complain about the credit card bills that his wife runs up. Compute The Average Kids Per Family. ~A coworker brings a personal electronic device into a prohibited area. Which of the following may be helpful to prevent inadvertent spillage? Sensitive information may be stored on any password-protected system. what should be your response be? Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Taking classified documents from your workspace. cyber. *Spillage What should you do if you suspect spillage has occurred? What should you do to protect yourself while on social networks? Within a secure area, you see an individual you do not know. Correct. Quizzma is a free online database of educational quizzes and test answers. You believe that you are a victim of identity theft. The answer has been confirmed to be correct. Top Secret information could be expected to cause exceptionally grave damage to national security of disclosed. What is a security best practice to employ on your home computer? The website requires a credit card for registration. If you receive a phone call from a stranger asking for information about your invoice payment process, you should: Crucial information about a user or organization can be gained through. 1.1.4 Social Networking. You may use your personal computer as long as it is in a secure area in your home b. Filter by: All $ Off % Off Free Online Offline. Tell us about it through the REPORT button at the bottom of the page. We recommend Norton Security or McAfee Total Protection. **Mobile Devices What should you do when going through an airport security checkpoint with a Government-issued mobile device? correct. Note the websites URL and report the situation to your security point of contact. What information most likely presents a security risk on your personal social networking profile? Which of the following is an example of malicious code? Here you can find answers to the DoD Cyber Awareness Challenge. Correct. 8. (Spillage) Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? If aggregated, the classification of the information may not be changed. Looking for https in the URL. On September 14, 2016, NARA issued a final rule amending 32 CFR Part 2002 to establish a uniform policy for all Federal agencies and prescribe Government-wide program implementation standards, including designating, safeguarding, disseminating, marking, decontrolling, and disposing of CUI; self-inspection and oversight requirements; and other facets of the CUI Program. We thoroughly check each answer to a question to provide you with the most correct answers. *Malicious Code After visiting a website on your Government device, a popup appears on your screen. Which of the following is NOT a home security best practice? Its classification level may rise when aggregated. Which of the following may help to prevent spillage? (Sensitive Information) What certificates are contained on the Common Access Card (CAC)? Enable automatic screen locking after a period of inactivity. *Sensitive Compartmented Information What should the participants in this conversation involving SCI do differently? Which of the following must you do before using an unclassified laptop and peripherals in a collateral classified environment? After you have returned home following the vacation. Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Select the information on the data sheet that is protected health information (PHI). (Sensitive Compartmented Information) What describes how Sensitive Compartmented Information is marked? *Sensitive Compartmented Information Which must be approved and signed by a cognizant Original Classification Authority (OCA)? Store it in a shielded sleeve to avoid chip cloning. Insiders are given a level of trust and have authorized access to Government information systems. Contents hide. In addition to avoiding the temptation of greed to betray his country, what should Alex do differently? Which may be a security issue with compressed urls? (Wrong). d. giving a spanking or a scolding. Which of the following is a good practice to protect classified information? You receive an unexpected email from a friend: "I think you'll like this: (URL)" What action should you take? **Social Engineering How can you protect yourself from internet hoaxes? not correct Which of the following represents an ethical use of your Government-furnished equipment (GFE)? What action should you take? Only use Government-furnished or Government-approved equipment to process PII. Definition 1 / 24 -It must be released to the public immediately. Monitor credit card statements for unauthorized purchases, Thumb drives, memory sticks, and flash drives are examples of. Of the following, which is NOT a characteristic of a phishing attempt? Photos of your pet Correct. Discuss why gases, such as barbecue propane gas, are sold by mass and not by volume. Thiswill enabletimely and consistent informationsharing andincreasetransparency throughout the Federal government and with non-Federal stakeholders. Always use DoD PKI tokens within their designated classification level. Hostility or anger toward the United States and its policies. **Social Networking As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? Which of the following is NOT sensitive information? How many potential insider threat indicators is Bob displaying? Which of the following is a best practice for physical security? **Physical Security What is a good practice for physical security? a. putting a child in time-out What should you do? Which of these is true of unclassified data? Correct. How many potential insider threat indicators does this employee display? Correct Which of the following does NOT constitute spillage? correct. Which is NOT a wireless security practice? asked in Internet by voice (265k points) Question : Which of the following is true about unclassified data? Which of the following is NOT considered sensitive information? To determine premiums for automobile insurance, companies must have an understanding of the variables that affect whether a driver will have an accident. All of these. Which of the following represents a good physical security practice? -It must be released to the public immediately. (Mobile Devices) Which of the following statements is true? How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Secure .gov websites use HTTPS **Physical Security Within a secure area, you see an individual who you do not know and is not wearing a visible badge. "Unclassified" or a lack of security marking denotes non-sensitive information. 10-3 X-ray Interaction with Matter, Fundamentals of Engineering Economic Analysis, David Besanko, Mark Shanley, Scott Schaefer. Linda encrypts all of the sensitive data on her government-issued mobile devices. Proactively identify potential threats and formulate holistic mitigation responses. Use personal information to help create strong passwords. How Do I Answer The CISSP Exam Questions? 4. Correct. Discrete data involves whole numbers (integers - like 1, 356, or 9) that can't be divided based on the nature of what they are. Federal agencies routinely generate, use, store, and share information that, while not classified, still requires some level of protection from unauthorized access and release. Which of the following definitions is true about disclosure of confidential information? **Insider Threat What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? ALways mark classified information appropriately and retrieve classified documents promptly from the printer. (1) A strategic plan documenting the overall conduct of a war. What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? *Spillage Which of the following actions is appropriate after finding classified information on the Internet? Do not access links or hyperlinked media such as buttons and graphics in email messages. A headset with a microphone through a Universal Serial Bus (USB) port. (Sensitive Information) Which of the following is NOT an example of sensitive information? You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). If aggregated, the information could become classified. How can you protect yourself on social networking sites? However, agency personnel and contractors should first consult their agency's CUI implementing policies and program management for guidance. (Sensitive Compartmented Information) What portable electronic devices (PEDs) are allow in a Secure Compartmented Information Facility (SCIF)? How can you protect yourself from social engineering? (Travel) Which of the following is a concern when using your Government-issued laptop in public? (Malicious Code) What is a good practice to protect data on your home wireless systems? What is the best choice to describe what has occurred? Attachments contained in a digitally signed email from someone known. If classified information were released, which classification level would result in Exceptionally grave damage to national security? The Chinese Spy Balloon Showdown The discovery of a Chinese surveillance balloon floating over the United States has added to the rising tensions between the two superpowers. In addition to offering an overview of cybersecurity best practices, the challenge also provides awareness of potential and common cyber threats. Connect and share knowledge within a single location that is structured and easy to search. Back up your data: This will help you recover your data if it's lost or corrupted. No. Historically, each agency developed its own practices for sensitive unclassified information, resulting in a patchwork of systems across the Executive branch, in which similar information might be defined or labeled differently, or where dissimilar information might share a definition and/or label. #1) Open WEKA and select "Explorer" under 'Applications'. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? Report the crime to local law enforcement. Thats the only way we can improve. (Correct) -It does not affect the safety of Government missions. Sensitive information may be stored on any password-protected system. What information posted publicly on your personal social networking profile represents a security risk? Which of the following is NOT Government computer misuse? You know this project is classified. (controlled unclassified information) Which of the following is NOT correct way to protect CUI? How many insider threat indicators does Alex demonstrate? Classified information is defined in PL 96-456, the Classified Information Procedures Act: The National Archives and Records Administration (NARA) serves as the Controlled Unclassified Information (CUI) Executive Agent (EA). You receive a call on your work phone and youre asked to participate in a phone survey. CPCON 5 (Very Low: All Functions). Your password and the second commonly includes a text with a code sent to your phone. Cyber Awareness Challenge Knowledge Check 2023 Answers, Cyber Awareness Challenge 2022 Knowledge Check Answers. Use TinyURLs preview feature to investigate where the link leads. Which of the following is true about unclassified data? **Website Use How should you respond to the theft of your identity? Hostility or anger toward the United States and its policies. When using a public device with a card reader, only use your DoD CAC to access unclassified information, is only allowed if the organization permits it. Which of the following is not considered an example of data hiding? (Spillage) What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? Unclassified documents do not need to be marked as a SCIF. correct. Digitally signed e-mails are more secure. Looking at your MOTHER, and screaming THERE SHE BLOWS! The following table lists the number of drivers in the United States, the number of fatal accidents, and the number of total accidents in each age group in 2002. *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. (Home computer) Which of the following is best practice for securing your home computer? laptops, fitness bands, tablets, smartphones, electric readers, and Bluetooth devices. Refer the reporter to your organizations public affairs office. Which of the following is a good practice to prevent spillage? *Sensitive Compartmented Information When should documents be marked within a Sensitive Compartmented Information Facility (SCIF). The potential for unauthorized viewing of work-related information displayed on your screen. The CAC/PIV is a controlled item and contains certificates for: An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? When is it appropriate to have your security badge visible? How many potential insider threat indicators does this employee display? Log in for more information. Which of the following is NOT a potential insider threat? How are Trojan horses, worms, and malicious scripts spread? What should you do? The annual Cyber Awareness Challenge is a course that helps authorized users learn how to best avoid and reduce threats and vulnerabilities in an organizations system. Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only? Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. **Identity management Which of the following is NOT a best practice to preserve the authenticity of your identity? Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. Matt Monroe, a 20-year U. S. Air Force veteran and current operations manager at Omnistruct, explains the breakdown, "There are four classified information categories in the military based on the severity of damage that the information's release would cause.