When classified data is not in use, how can you protect it? Which of the following is true of Internet of Things (IoT) devices? If aggregated, the classification of the information may not be changed. Tell us about it through the REPORT button at the bottom of the page. Delete email. Unauthorized Disclosure of Classified Information for DoD, Security Awareness: Derivative Classification Answers, CITI Ethics, Responsible Conduct, RCR, Law, HTH And IRB Answers, Level 1 Antiterrorism Awareness Training Pretest And Post Test Answers, EVERFI Achieve Consumer Financial Education Answers, Security Pro: Chapter 3 (3.1.8) & 4.1 Security Policies Answers, CITI Module #3 Research in Public Elementary and Secondary Schools, Answers to CTS Unit 7 Lab 7-2: Protocols and Services SNMP, Google Analytics Individual Qualification Exam Answers, Everfi Module 4 Credit Scores Quiz Answers, Which Of The Following Is Not Considered A Potential Insider Threat Indicator. As part of your proposal you will be required to provide a proposal title and a short abstract that you permit us to publish and use freely. (Spillage) Which of the following is a good practice to aid in preventing spillage? Controlled Unclassified Information (CUI). Select Yes or No for each item. 1304). What should be your response? A medium secure password has at least 15 characters and one of the following. Its classification level may rise when aggregated. Use TinyURLs preview feature to investigate where the link leads. In providing Government Property to a Contractor the Contracting Officer must also make sure that a Contractor is not given an unfair competitive advantage over another Contractor who may not have Government Property. Gambling online - No Equipment which is Government-provided will be furnished and installed by the Government in space made available by the Contractor and with rough-in made by the Contractor in accord with the information made available or referenced herein or indicated. (GFE) When can you check personal e-mail on your Government-furnished equipment (GFE)? New interest in learning another language, Which of the following is a good practice to protect classified information. (Travel) Which of the following is a concern when using your Government-issued laptop in public? A coworker is observed using a personal electronic device in an area where their use is prohibited. They can become an attack vector to other devices on your home network. 1068 0 obj
<>
endobj
Do not access website links, buttons, or graphics in e-mail. **Insider Threat Which of the following should be reported as a potential security incident? Validate friend requests through another source through another source before confirming them. used in telework environments in accordance with reference (b). - Updated Terms and conditions. Which of the following is a good practice to prevent spillage. a. When would be a good time to post your vacation location and dates on your social networking website? What are some potential insider threat indicators? After you have returned home following the vacation. What should Sara do when using publicly available Internet, such as hotel Wi-Fi? requirements to access classified information. Correct. As long as the document is cleared for public release, you may release it outside of DoD. When vacation is over, after you have returned home. Which of the following is a security best practice for protecting Personally Identifiable Information (PII)? While it may seem safer, you should NOT use a classified network for unclassified work. How should you respond? You must have your organization's permission to telework. Badges must be visible and displayed above the waist at all times when in the facility. Use the classified network for all work, including unclassified work. How can you protect yourself from social engineering? See PGI 245.103-72, Government- furnished property (GFP) attachments to solicitations and awards. DOD Cyber Awareness Challenge 2019 (DOD-IAA-V16.0) *Sensitive Compartmented Information When is it appropriate to have your security badge visible? Which of the following is a best practice for using removable media? What type of data must be handled and stored properly based on classification markings and handling caveats? 3 0 obj
c. Classified information that is intentionally moved to a lower protection level without authorization. *Spillage Which of the following actions is appropriate after finding classified information on the Internet? Security Classification Guides. Access requires Top Secret clearance and indoctrination into the SCI program. They can become an attack vector to other devices on your home network. Edited/new version of DASA Short form contract uploaded to documents, Update to text from 'All competitions will use the new' to 'Many competitions, especially Phase 1 earlier TRL competitions, will use the new', Please note we have updated our short form contract template. Government furnished or purchased equipment or services provided to employees as the result of approved reasonable accommodation requests. business math. 0-`*0r+u,1+~p]"WC0`=0uG!o8zGkv57?8/ssmZ]bw>V3^aiKPH(pUcWqR)u
KmPy (TL2 ;A- fKpe'xfX@na=lzt
Qh|(j@SYG}~1BY/6:{HqMvD`
KNZ/)t\+b*"gO1s Have your permissions from your organization, follow your organization guideline, use authorized equipment and software, employ cyber security best practice, perform telework in dedicated when home. Create separate user accounts with strong individual passwords. A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive car, and has unexplained absences from work. Secure facilities allow open storage of classified material c Classified material may be used in unsecured areas as long as it remains in the possession of an individual with the proper clearance and need-to-know. 31 terms. Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. c. Nothing. **Home Computer Security What should you consider when using a wireless keyboard with your home computer? You are reviewing your employees annual self evaluation. Accepting the default privacy settings. correct. **Identity management What is the best way to protect your Common Access Card (CAC)? Which of the following is true of downloading apps? Avoid attending professional conferences. Well use the email address that you used to create your account and the telephone number in your profile to contact you. (Sensitive Information) What should you do if a commercial entity, such as a hotel reception desk, asks to make a photocopy of your Common Access Card (CAC) for proof of Federal Government employment? \text{Capital Stock}&\text{Credit}&&\\ yQDx^e|z%HmM4}?>rl\0e_qn;]8sg"pml1d0&wG_-o Fs\Y.>^|]HKTs=tF"l_A{h#: 3^P_h}k Which designation includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? [1]. Maybe c. Analyze the other workstations in the SCIF for viruses or malicious code. It is your responsibility as an employee to protect and conserve Government-owned or -leased property and vehicles and to use them only for authorized purposes. Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. answered by admic (1.0m points) selected by voice. What is the total manufacturing cost assigned to Job 413? Which of the following statements is NOT true about protecting your virtual identity? Prudence faxes CUI using an Unclassified cover sheet via a Secret fax machine. While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. This information will only be used for the purposes for which it is provided to us. Use only personal contact information when establishing your personal account. a. Incident #1 Enable automatic screen locking after a period of inactivity. (Spillage) When classified data is not in use, how can you protect it? Which of the following is a good practice to prevent spillage? *Sensitive Information Under which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? Call your security point of contact immediately. Which of the following demonstrates proper protection of mobile devices? ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIV) card. What is the best course of action? DASA submissions are welcome from the private sector, academia, individuals (i.e. How many potential insiders threat indicators does this employee display? The following table summarizes the rules of debit and credit. A man you do not know is trying to look at your Government-issued phone and has asked to use it. How many potential insider threat indicators is Bob displaying? See the table below for guidance. Note the websites URL and report the situation to your security point of contact. What are the requirements to be granted access to sensitive compartmented information (SCI)? As long as the document is cleared for public release, you may share it outside of DoD. Which of the following is NOT an example of sensitive information? Correct. 0
cyber-awareness email government organisation permission equipment 1 answer Under what circumstances is it acceptable to use your Government-furnished computer to check person e-mail asked in Internet by voice (263k points) internet internet-quiz cyber cyber-awareness government computer email personal policy 1 answer Subject: Government Furnished Equipment for Telework and Remote Employees. When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. Many apps and smart devices collect and share your personal information and contribute to your online identity. How can you protect yourself on social networking sites? Sensitive Compartmented Information (Incident #1): When is it appropriate to have your security badge visible? *Sensitive Compartmented Information Which must be approved and signed by a cognizant Original Classification Authority (OCA)? Linda encrypts all of the sensitive data on her government issued mobile devices. **Physical Security What is a good practice for physical security? The annual Cyber Awareness Challenge is a course that helps authorized users learn how to best avoid and reduce threats and vulnerabilities in an organizations system. What should you do if someone asks to use your government issued mobile device (phone/laptop..etc)? Do not access website links in e-mail messages. b. Upon connecting your Government- issued laptop to a public wireless connection, what should you immediately do? the whistleblower protection enhancement act relates to reporting.