**Removable Media in a SCIF What must users ensure when using removable media such as compact disk (CD)? What should you do? Telework is only authorized for unclassified and confidential information. What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)? (Malicious Code) Which of the following is true of Internet hoaxes? Look for a digital signature on the email. Being cognizant of classification markings and labeling practices are good strategies to avoid inadvertent spillage. What structures visible in the stained preparation were invisible in the unstained preparation? How can you guard yourself against Identity theft? A Common Access Card and Personal Identification Number. Which of the following does not constitute spillage. What can be used to track Marias web browsing habits? How should you securely transport company information on a removable media? Which of the following is NOT sensitive information? If possible, set your browser preferences to prompt you each time a website wants to store a cookie. A coworker removes sensitive information without authorization. __________, To supervise bank holding companies and state member banks __________, To make loans to businesses who want to expand their operations __________, To operate the check-clearing system for the nation __________, to provide financial services to the federal government and serve as the bankers bank for commercial banks and other depositary institutions __________, To serve as the fiscal agent of the U.S. government __________, To place printed paper currency and newly minted coins into circulation __________. Refer the reporter to your organizations public affairs office. A passenger in the Land Rover Freelander that T-boned the hatchback said the BMW had been driven out of the unclassified road towards Shipton-under-Wychwood 'like a bat out of hell' - giving . Contents hide. On a NIPRNET system while using it for a PKI-required task. **Social Engineering What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? *Spillage Which of the following may help prevent inadvertent spillage? **Insider Threat What function do Insider Threat Programs aim to fulfill? Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Select the information on the data sheet that is protected health information (PHI). Matt Monroe, a 20-year U. S. Air Force veteran and current operations manager at Omnistruct, explains the breakdown, "There are four classified information categories in the military based on the severity of damage that the information's release would cause. Set hasDigit to true if the 3-character passCode contains a digit, Critical, Essential, and Support Functions. Controlled Unclassified Information (CUI) Purpose of the CUI Program. (Malicious Code) What is a common indicator of a phishing attempt? With WEKA users, you can access WEKA sample files. correct. Follow procedures for transferring data to and from outside agency and non-Government networks. What should you do? *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Refer the vendor to the appropriate personnel. Which of the following may help to prevent spillage? Where. Which of the following is NOT considered sensitive information? correct. You should remove and take your CAC/PIV card whenever you leave your workstation. P2P (Peer-to-Peer) software can do the following except: Allow attackers physical access to network assets. You must have your organizations permission to telework. What should be done if you find classified Government Data/Information Not Cleared for Public Release on the Internet? What should you do to protect yourself while on social networks? *Sensitive Compartmented Information What is a Sensitive Compartmented Information (SCI) program? **Use of GFE When can you check personal e-mail on your Government-furnished equipment (GFE)? *Sensitive Information Which of the following is an example of Protected Health Information (PHI)? *Sensitive Information What is the best example of Personally Identifiable Information (PII)? While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. *Sensitive Compartmented Information When should documents be marked within a Sensitive Compartmented Information Facility (SCIF). Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. *Sensitive Compartmented Information When faxing Sensitive Compartmented Information (SCI), what actions should you take? Which of the following is an example of removable media? What should you do? Historically, each agency developed its own practices for sensitive unclassified information, resulting in a patchwork of systems across the Executive branch, in which similar information might be defined or labeled differently, or where dissimilar information might share a definition and/or label. Which of the following statements is true? Correct. 870 Summit Park Avenue Auburn Hills, MI 48057. d. giving a spanking or a scolding. What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered? Which of the following is NOT one? New interest in learning another language, Which of the following is a good practice to protect classified information. (Spillage) What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? Figure 1. *Spillage Which of the following is a good practice to aid in preventing spillage? **Use of GFE Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? Decline to let the person in and redirect her to security. Information should be secured in a cabinet or container while not in use. Enable automatic screen locking after a period of inactivity. The website requires a credit card for registration. Read the latest news from the Controlled Unclassified Information (CUI) program. How do you respond? Controlled unclassified information. Immediately notify your security point of contact. How should you respond? Which of the following attacks target high ranking officials and executives? **Social Engineering Which may be a security issue with compressed Uniform Resource Locators (URLs)? You know this project is classified. You should only accept cookies from reputable, trusted websites. A colleague removes sensitive information without seeking authorization in order to perform authorized telework. correct. **Identity management Which of the following is NOT a best practice to preserve the authenticity of your identity? There are no choices provides which make it hard to pick the untrue statement about unclassified data. Antihistamines are used to treat the symptoms, such as sneezing, that are due to inflammation caused by irritants in the airways. A coworker removes sensitive information without approval. Which of these is true of unclassified data?-It must be released to the public immediately.-Its classification level may rise when aggregated. Search the Registry: Categories, Markings and Controls: Category list CUI markings Always check to make sure you are using the correct network for the level of data. How many potential insiders threat indicators does this employee display? A program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. After you have returned home following the vacation. Always take your CAC when you leave your workstation. When may you be subject to criminal, disciplinary, and/or administrative action due to online harassment, bullying, stalking, hazing, discrimination, or retaliation? What information most likely presents a security risk on your personal social networking profile? All data transfers via the internet are not 100% secure and there might be some security vulnerabilities. You have reached the office door to exit your controlled area. Sensitive information. **Insider Threat What is an insider threat? How should you respond? Unauthorized Disclosure of Classified Information for DoD, Security Awareness: Derivative Classification Answers, CITI Ethics, Responsible Conduct, RCR, Law, HTH And IRB Answers, EVERFI Achieve Consumer Financial Education Answers, Security Pro: Chapter 3 (3.1.8) & 4.1 Security Policies Answers, CITI Module #3 Research in Public Elementary and Secondary Schools, Answers to CTS Unit 7 Lab 7-2: Protocols and Services SNMP, Google Analytics Individual Qualification Exam Answers, Everfi Module 4 Credit Scores Quiz Answers, Which Of The Following Is Not Considered A Potential Insider Threat Indicator. Keep your operating system and software up to date: This will help patch any security vulnerabilities in your software. **Classified Data Which of the following is true of telework? What is a best practice for protecting controlled unclassified information (CUI)? Which of the following is NOT Protected Health Information (PHI)? Before long she has also purchased shoes from several other websites. Which of the following is a security best practice when using social networking sites? *Sensitive Compartmented Information What should the owner of this printed SCI do differently? Do not access website links in e-mail messages. Which of these is true of unclassified data? When is the best time to post details of your vacation activities on your social networking website? The email provides a website and a toll-free number where you can make payment. How can you protect data on your mobile computing and portable electronic devices (PEDs)? **Physical Security What is a good practice for physical security? Memory sticks, flash drives, or external hard drives. (Sensitive Information) What guidance is available from marking Sensitive Information information (SCI)? Senior government personnel, military or civilian. (Sensitive Information) Which of the following represents a good physical security practice? Based on the description that follows, how many potential insider threat indicator (s) are displayed? **Social Engineering Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? Sensitive information may be stored on any password-protected system. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. What should you do? Which of the following is true of Unclassified information? Neither confirm or deny the information is classified. View email in plain text and dont view email in Preview Pane. -Its classification level may rise when aggregated. Classified information is defined in PL 96-456, the Classified Information Procedures Act: The challenges goal is simple: To change user behavior to reduce the risks and vulnerabilities DoD Information Systems face. What should you do? Of the following, which is NOT a security awareness tip? not correct Prudence faxes CUI using an Unclassified cover sheet via a Secret fax machine. DOD Cyber Awareness 2021 (DOD-IAA-V18.0) Know, RT202: Ch. cyber-awareness. Use personal information to help create strong passwords. **Insider Threat What do insiders with authorized access to information or information systems pose? A coworker brings a personal electronic device into prohibited areas. Correct. You know that this project is classified. A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive car, and has unexplained absences from work. As a security best practice, what should you do before exiting? Which of the following is true of sharing information in a Sensitive Compartmented Information Facility (SCIF)? Which may be a security issue with compressed urls? Ask the individual to see an identification badge. What is a valid response when identity theft occurs? Which of the following is NOT a criterion used to grant an individual access to classified data? Search for an answer or ask Weegy. Under what circumstances could unclassified information be considered a threat to national security? Which of the following actions can help to protect your identity? **Insider Threat How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display?