which of the following is true about unclassified data

Which of the following represents a good physical security practice? Linda encrypts all of the sensitive data on her government-issued mobile devices. Classification markings and handling caveats. **Insider Threat Which of the following should be reported as a potential security incident? Never allow sensitive data on non-Government-issued mobile devices. Contents hide. What is a way to prevent the download of viruses and other malicious code when checking your e-mail? Which of the following statements is NOT true about protecting your virtual identity? You must have your organizations permission to telework. After you have returned home following the vacation. (Answer) CPCON 2 (High: Critical and Essential Functions) CPCON 1 (Very High: Critical Functions) CPCON 3 (Medium: Critical, Essential, and Support Functions) CPCON 4 (Low: All Functions) CPCON 5 (Very Low: All Functions). Which of the following is true of Internet of Things (IoT) devices? What should you do to protect yourself while on social networks? Historically, each agency developed its own practices for sensitive unclassified information, resulting in a patchwork of systems across the Executive branch, in which similar information might be defined or labeled differently, or where dissimilar information might share a definition and/or label. Unclassified is a security classification assigned to official information that does not warrant the assignment of Confidential, Secret, or Top Secret markings but which is not publicly-releasable without authorization. What is the best response if you find classified government data on the internet? You receive an inquiry from a reporter about potentially classified information on the internet. (Malicious Code) Which of the following is true of Internet hoaxes? **Website Use How should you respond to the theft of your identity? Approved Security Classification Guide (SCG). Malicious code can mask itself as a harmless e-mail attachment, downloadable file, or website. Which of the following is an example of malicious code? Which of the following personally-owned computer peripherals is permitted for use with Government-furnished equipment? **Travel Which of the following is true of traveling overseas with a mobile phone? How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? 1.To provide opportunities for individuals and businesses to open checking accounts __________, To write rules and guidelines for financial institutions under its supervision __________, To be the lender of last resort for financial institutions __________, To conduct the nations monetary policy with the goals of maintaining full employment and price stability __________, 5. Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIV) card. How are Trojan horses, worms, and malicious scripts spread? Always check to make sure you are using the correct network for the level of data. It is not corporate intellectual property unless created for or included in requirements related to a government contract. They may be used to mask malicious intent. (Sensitive Information) What certificates are contained on the Common Access Card (CAC)? What information should you avoid posting on social networking sites? **Insider Threat How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? Three or more. Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI. What is the best example of Protected Health Information (PHI)? . Should you always label your removable media? THIS IS THE BEST ANSWER . Correct. Which of the following is NOT sensitive information? Thiswill enabletimely and consistent informationsharing andincreasetransparency throughout the Federal government and with non-Federal stakeholders. What should be your response? **Identity management What is the best way to protect your Common Access Card (CAC)? Correct. Sanitized information gathered from personnel records. Your favorite movie. TheNational Archives and Records Administration (NARA)servesas the Controlled Unclassified Information (CUI) Executive Agent (EA). A colleague saves money for an overseas vacation every year, is a . Of the following, which is NOT a security awareness tip? Correct. What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? You know this project is classified. On a NIPRNet system while using it for a PKI-required task, Something you possess, like a CAC, and something you know, like a PIN or password. Attachments contained in a digitally signed email from someone known. Adversaries exploit social networking sites to disseminate fake news. When unclassified data is aggregated, its classification level may rise. Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Which of the following is NOT a DoD special requirement for tokens? Sensitive information may be stored on any password-protected system. It is created or received by a healthcare provider, health plan, or employer. Paul verifies that the information is CUI, includes a CUI marking in the subject header and digitally signs an e-mail containing CUI. A smartphone that transmits credit card payment information when held in proximity to a credit card reader. What function do Insider Threat Programs aim to fulfill? Secure .gov websites use HTTPS Request the users full name and phone number. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. Which of the following is a concern when using your Government-issued laptop in public? Security Classification Guides (SCGs).??? Call your security point of contact immediately. (Malicious Code) What is a common indicator of a phishing attempt? Her badge is not visible to you. (Correct) -It does not affect the safety of Government missions. The EPA will phase out legacy markings and safeguarding practices as implementation proceeds. What should you do if a reporter asks you about potentially classified information on the web? Classified information is defined in PL 96-456, the Classified Information Procedures Act: Call your security point of contact immediately. When gases are sold they are usually compressed to high pressures. A .gov website belongs to an official government organization in the United States. Memory sticks, flash drives, or external hard drives. data. Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? Always take your CAC when you leave your workstation. Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. What should you do after you have ended a call from a reporter asking you to confirm potentially classified information found on the web? How many potential insider threat indicators does this employee display? In which situation below are you permitted to use your PKI token? The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. The answer has been confirmed to be correct. What should you do? Your password and the second commonly includes a text with a code sent to your phone. Which of the following is not a best practice to preserve the authenticity of your identity? -It never requires classification markings. As long as the document is cleared for public release, you may share it outside of DoD. What is a possible indication of a malicious code attack in progress? Do not forward, read further, or manipulate the file; Do not give out computer or network information, Do not follow instructions from unverified personnel. Official websites use .gov A coworker has left an unknown CD on your desk. CUI must be handled using safeguarding or dissemination controls. Power off any mobile devices when entering a secure area. Connect to the Government Virtual Private Network (VPN). Which of the following is true of Unclassified information? Lock your device screen when not in use and require a password to reactivate. Which of the following best describes the sources that contribute to your online identity. Follow instructions given only by verified personnel. Use TinyURL's preview feature to investigate where the link leads. The email has an attachment whose name contains the word secret. T/F. Maintain visual or physical control of the device. Hostility or anger toward the United States and its policies. You are leaving the building where you work. Which designation includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? The website requires a credit card for registration. -TRUE What action is recommended when somebody calls you to inquire about your work environment or specific account information? Based on the description that follows, how many potential insider threat indicator(s) are displayed? *Social Networking Which of the following is NOT a potential insider threat? What type of attack might this be? Search for an answer or ask Weegy. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. **Physical Security At which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Correct. Be aware of classification markings and all handling caveats. This task is performed with the aim of finding similarities in data points and grouping similar data points together. Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. See the discussed example before. Were mitochondria as abundant in human epithelial cells as in onion epidermal cells (procedure 4.6)? (Identity Management) Which of the following is an example of two-factor authentication? asked in Internet by voice (265k points) Question : Which of the following is true about unclassified data? Scan external files from only unverifiable sources before uploading to computer. How many insider threat indicators does Alex demonstrate? You receive an unexpected email from a friend: "I think you'll like this: (URL)" What action should you take? *Sensitive Information Which of the following is an example of Protected Health Information (PHI)? A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. correct. You receive an unexpected email from a friend: I think youll like this: https://tinyurl.com/2fcbvy. What action should you take? Which of the following is NOT a criterion used to grant an individual access to classified data? What is a valid response when identity theft occurs? Confirm the individuals need-to-know and access. You are having lunch at a local restaurant outside the installation, and you find a cd labeled favorite song. While it may seem safer, you should NOT use a classified network for unclassified work. The CAC/PIV is a controlled item and contains certificates for: An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what?

West Bloomfield High School Yearbook, D Is For Digital Wrap Up On Hardware, Yeshua Hamashiach Written In Hebrew, Greg Mullavey Obituary, Select The Correct Statements About Transmission And Exposure, Articles W

X