Gareth Thomas Husband, Knuckles Down In Golf Takeaway, Hayward Permit Application, Articles W

?Access requires Top Secret clearance and indoctrination into SCI program.??? **Insider Threat Which of the following is NOT considered a potential insider threat indicator? For Government-owned devices, use approved and authorized applications only. Official websites use .gov *Controlled Unclassified Information Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? Antihistamines are used to treat the symptoms, such as sneezing, that are due to inflammation caused by irritants in the airways. #1) Open WEKA and select "Explorer" under 'Applications'. Do not forward, read further, or manipulate the file; Do not give out computer or network information, Do not follow instructions from unverified personnel. Note any identifying information and the websites Uniform Resource Locator (URL). (Sensitive Information) Which of the following is NOT an example of sensitive information? When your vacation is over, after you have returned home. Which of the following may help to prevent spillage? Which of the following is true of Security Classification Guides? In which situation below are you permitted to use your PKI token? *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Which of the following does NOT constitute spillage? **Insider Threat Which scenario might indicate a reportable insider threat? To transmit large payments through Fedwire __________, To regulate and supervise the stock market to provide stability and security to individual investors. Unknown data is categorized by the system; an analyst then reviews the results Which of the following should be reported as a potential security incident? Malicious code can do the following except? Never allow sensitive data on non-Government-issued mobile devices. Is it okay to run it? Exceptionally grave damage. Which of the following actions can help to protect your identity? How many indicators does this employee display? Click the card to flip Flashcards Learn Test Match Created by Jamie_Lancaster Terms in this set (24) Law Enforcement Sensitive (LES),and others. Public service, notably service in the United States Department of Defense or DoD, is a public trust. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. Always take your CAC when you leave your workstation. Telework is only authorized for unclassified and confidential information. A headset with a microphone through a Universal Serial Bus (USB) port. The age of the driver may top the list of variables. Which of the following is a security best practice for protecting Personally Identifiable Information (PII)? What should you do to protect classified data? TheNational Archives and Records Administration (NARA)servesas the Controlled Unclassified Information (CUI) Executive Agent (EA). The answer has been confirmed to be correct. However, agency personnel and contractors should first consult their agency's CUI implementing policies and program management for guidance. How should you respond? **Travel What is a best practice while traveling with mobile computing devices? Thiswill enabletimely and consistent informationsharing andincreasetransparency throughout the Federal government and with non-Federal stakeholders. A smartphone that transmits credit card payment information when held in proximity to a credit card reader. *Sensitive Information What is the best example of Personally Identifiable Information (PII)? 1.1.2 Classified Data. What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered? It should only be in a system while actively using it for a PKI-required task. Which of the following is true about unclassified data? Which of the following is a concern when using your Government-issued laptop in public? A measure of how much useful work each unit of input energy provides. Which of the following is NOT a home security best practice? Correct. Not correct What structures visible in the stained preparation were invisible in the unstained preparation? *Sensitive Compartmented Information When is it appropriate to have your security badge visible? (Sensitive Information) Which of the following is true about unclassified data? Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. SSN, date and place of birth, mothers maiden name, biometric records, PHI, passport number, Subset of PII, health information that identifies the individual, relates to physical or mental health of an individual, provision of health care to an individual, or payment of healthcare for individual. Retrieve classified documents promptly from printers. 8. Maybe b. What action should you take first? cyber. Which scenario might indicate a reportable insider threat security incident? *Sensitive Compartmented Information When faxing Sensitive Compartmented Information (SCI), what actions should you take? Search for an answer or ask Weegy. Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Which of the following is NOT a typical result from running malicious code? Which of the following is NOT true concerning a computer labeled SECRET? The following table lists the number of drivers in the United States, the number of fatal accidents, and the number of total accidents in each age group in 2002. If you receive a phone call from a stranger asking for information about your invoice payment process, you should: Crucial information about a user or organization can be gained through. You can email your employees information to yourself so you can work on it this weekend and go home now. Thats the only way we can improve. CPCON 4 (Low: All Functions) A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. What actions should you take with a compressed Uniform Resource Locator (URL) on a website known to you? Insiders are given a level of trust and have authorized access to Government information systems. Unusual interest in classified information. What describes how Sensitive Compartmented Information is marked? A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. New interest in learning another language, Which of the following is a good practice to protect classified information. correct. What should be your response? Which designation marks information that does not have potential to damage national security? Third, the neighbor ground points of an unclassified point are searched from multiple subspaces. Which may be a security issue with compressed urls? Which of the following individuals can access classified data? Your password and the second commonly includes a text with a code sent to your phone. I may decide not to consent to these terms, but, if I do not consent to all of these terms, then I agree not to proceed with creating an account or moving forward with filling out the application, and I understand that I will not be . T/F. CUI must be handled using safeguarding or dissemination controls. Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. Never write down the PIN for your CAC. Correct. Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? A Coworker has asked if you want to download a programmers game to play at work. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. John submits CUI to his organizations security office to transmit it on his behalf. Which of the following is true of using DoD Public key Infrastructure (PKI) token? On a NIPRNET system while using it for a PKI-required task. true-statement. Which of the following is an example of a strong password? Store it in a locked desk drawer after working hours. When unclassified data is aggregated, its classification level may rise. **Classified Data When classified data is not in use, how can you protect it? It contains certificates for identification, encryption, and digital signature. How Do I Answer The CISSP Exam Questions? Request the users full name and phone number. Q&A for work. This lets the service person know when the tank is "full." Which scenario might indicate a reportable insider threat? **Identity management What is the best way to protect your Common Access Card (CAC)? asked in Internet by voice (265k points) internet. **Social Networking What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sires visited? You should only accept cookies from reputable, trusted websites. Retrieve classified documents promptly from printers. It does not require markings or distribution controls. Use only personal contact information when establishing your personal account. What should you do? Controlled Unclassified Information (CUI) Purpose of the CUI Program. Always check to make sure you are using the correct network for the level of data. Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? **Classified Data Which of the following must you do before using and unclassified laptop and peripherals in a collateral environment? A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. What information most likely presents a security risk on your personal social networking profile? Organizational Policy Not correct A colleague saves money for an overseas vacation every year, is a . Filter by: All $ Off % Off Free Online Offline. Question 1: The business impact analysis (BIA) identifies the resources for which a business continuity plan (BCP) is necessary. How many potential insider threat indicators does this employee display? cyber-awareness. What actions should you take prior to leaving the work environment and going to lunch? Which of the following is NOT Protected Health Information (PHI)? A coworker removes sensitive information without approval. Federal agencies routinely generate, use, store, and share information that, while not classified, still requires some level of protection from unauthorized access and release. **Home Computer Security How can you protect your information when using wireless technology? Search by Location. A lock (LockA locked padlock) or https:// means youve safely connected to the .gov website. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? It is releasable to the public without clearance. laptops, fitness bands, tablets, smartphones, electric readers, and Bluetooth devices. Which of the following is a reportable insider threat activity? **Social Networking Which of the following information is a security risk when posted publicly on your social networking profile? **Insider Threat Which of the following should be reported as a potential security incident? **Insider Threat How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? A 3%3\%3% penalty is charged for payment after 303030 days. It never requires classification markings, is true about unclassified data. Create separate user accounts with strong individual passwords. What is a proper response if spillage occurs? Directives issued by the Director of National Intelligence. Dofficult life circumstances, such as death of spouse. Only use Government-furnished or Government-approved equipment to process PII. What should you consider when using a wireless keyboard with your home computer? He has the appropriate clearance and a signed, approved, non-disclosure agreement. Carrying his Social Security Card with him, DoD employees are prohibited from using a DoD CAC in card-reader-enabled public device, Assigned a classification level by a supervisor. Is this safe? Which of the following is true of Internet of Things (IoT) devices? Which of the following is true of traveling overseas with a mobile phone. Linda encrypts all of the sensitive data on her government-issued mobile devices. (Spillage) When is the safest time to post details of your vacation activities on your social networking website? Spillage occurs when information is spilled from a higher classification or protection level to a lower classification or protection level. Historically, each agency developed its own practices for sensitive unclassified information, resulting in a patchwork of systems across the Executive branch, in which similar information might be defined or labeled differently, or where dissimilar information might share a definition and/or label. See the discussed example before. You are leaving the building where you work. Note That The Integers Should Be Type Cast To Doubles. Store classified data appropriately in a GSA-approved vault/container when not in use. What type of activity or behavior should be reported as a potential insider threat? What information most likely presents a security risk on your personal social networking profile? **Removable Media in a SCIF What must users ensure when using removable media such as compact disk (CD)? What should you do to protect yourself while on social networks? Being cognizant of classification markings and labeling practices are good strategies to avoid inadvertent spillage. (Correct) -It does not affect the safety of Government missions. What function do Insider Threat Programs aim to fulfill? The attributes of identified ground seeds are modified to ground points. Based on the description that follows, how many potential insider threat indicator (s) are displayed? Before long she has also purchased shoes from several other websites. **Insider Threat How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? Attachments contained in a digitally signed email from someone known. When leaving your work area, what is the first thing you should do? Which of the following is NOT an example of Personally Identifiable Information (PII)? -Its classification level may rise when aggregated. You must have your organization's permission to telework c. You may use unauthorized software as long as your computer's antivirus software is up to date. Original classification authority Correct. Classified material must be appropriately marked. (social networking) Which of the following is a security best practice when using social networking sites? Hostility or anger toward the United States and its policies. What should you do? **Insider Threat Which type of behavior should you report as a potential insider threat? (Sensitive Information) What certificates are contained on the Common Access Card (CAC)? Spear Phishing attacks commonly attempt to impersonate email from trusted entities. What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered? Linda encrypts all of the sensitive data on her government-issued mobile devices. When can you check personal email on your government furnished equipment? EPA anticipates beginning CUI practices (designating, marking, safeguarding, disseminating, destroying, and decontrolling) starting in FY2023. Upon connecting your Government- issued laptop to a public wireless connection, what should you immediately do? Which of the following is a good practice to avoid email viruses? Your favorite movie. f. Get an answer. Note the websites URL and report the situation to your security point of contact. Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. Top Secret information could be expected to cause exceptionally grave damage to national security of disclosed. It is not corporate intellectual property unless created for or included in requirements related to a government contract. What is a best practice for protecting controlled unclassified information (CUI)? You must have your organizations permission to telework. correct. **Identity management Which of the following is NOT a best practice to preserve the authenticity of your identity? Verify the identity of all individuals.??? If authorized, what can be done on a work computer? Under What Circumstances Could Unclassified? ~A coworker brings a personal electronic device into a prohibited area. Mark SCI documents appropriately and use an approved SCI fax machine. **Social Networking Which of the following is a security best practice when using social networking sites? The CAC/PIV is a controlled item and contains certificates for: An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? They can be part of a distributed denial-of-service (DDoS) attack. (Malicious Code) Which are examples of portable electronic devices (PEDs)? What should you do? On September 14, 2016, NARA issued a final rule amending 32 CFR Part 2002 to establish a uniform policy for all Federal agencies and prescribe Government-wide program implementation standards, including designating, safeguarding, disseminating, marking, decontrolling, and disposing of CUI; self-inspection and oversight requirements; and other facets of the CUI Program. A coworker is observed using a personal electronic device in an area where their use is prohibited. Which of the following is true about unclassified data? At all times while in the facility. (Spillage) What should you do if a reporter asks you about potentially classified information on the web? What is a possible indication of a malicious code attack in progress? The Registry is updated as agencies continue to submit governing authorities that authorize the protection and safeguarding of sensitive information. What should be done if you find classified Government Data/Information Not Cleared for Public Release on the Internet? Malicious code can include viruses, worms, and macros. (Malicious Code) A coworker has asked if you want to download a programmers game to play at work. Remove your security badge after leaving your controlled area or office building. In unsupervised machine learning, clustering is the most common process used to identify and group similar entities or items together. **Insider Threat What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? (Correct) -It does not affect the safety of Government missions. *Sensitive Compartmented Information Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)? **Classified Data How should you protect a printed classified document when it is not in use? How many insider threat indicators does Alex demonstrate? To determine premiums for automobile insurance, companies must have an understanding of the variables that affect whether a driver will have an accident. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. All to Friends Only. PII, PHI, and financial information is classified as what type of information? Store it in a shielded sleeve to avoid chip cloning. Which of the following may help to prevent inadvertent spillage? The emission rate of CO 2 from the soils reached the maximum on the 1st day of incubation and the sequence of CO 2 emission rate and cumulative emission under different amendment treatments was as SG > S > G > CK > N (Fig. (Sensitive Compartmented Information) Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)? Some examplesyou may be familiar with: TheFederalCUI Registry,shows authorized categoriesandassociated markings, as well as applicable safeguarding, dissemination, and decontrol procedures. Directing you to a website that looks real. How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Unclassified documents do not need to be marked as a SCIF. Which of the following is a good practice to prevent spillage? Note any identifying information, such as the website's URL, and report the situation to your security POC. How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? (Spillage) Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? Ensure that the wireless security features are properly configured. *Controlled Unclassified Information Which is a best practice for protecting Controlled Unclassified Information (CUI)? Which type of information includes personal, payroll, medical, and operational information? How many potential insider threat indicators does this employee display? A type of phishing targeted at senior officials. Which of the following is true of sharing information in a Sensitive Compartmented Information Facility (SCIF)? Use only personal contact information when establishing personal social networking accounts, never use Government contact information. What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? Your comments are due on Monday. A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. You are having lunch at a local restaurant outside the installation, and you find a cd labeled favorite song. (Identity Management) Which of the following is an example of two-factor authentication? Correct. Physical security of mobile phones carried overseas is not a major issue. Sensitive information may be stored on any password-protected system. Correct. ! (A type of phishing targeted at senior officials) Which is still your FAT A$$ MOTHER! **Social Engineering What is TRUE of a phishing attack? (Spillage) After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. Found a mistake? Second, unclassified points are regarded as ground seeds if the distances between the points and the detected planes are less than a buffer difference threshold. NARAissuespolicy directives and publishesan annualreportto the President of the United Stateson the status of agency CUI Program implementation in accordance with Executive Order 13556, Controlled Unclassified Information. You check your bank statement and see several debits you did not authorize. When is it appropriate to have your security badge visible? What should be done to sensitive data on laptops and other mobile computing devices? When classified data is not in use, how can you protect it? **Physical Security Within a secure area, you see an individual who you do not know and is not wearing a visible badge. Compute The Average Kids Per Family. CPCON 2 (High: Critical and Essential Functions) This button displays the currently selected search type. Correct. What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure? General Services Administration (GSA) approval. E-mailing your co-workers to let them know you are taking a sick day. Alex demonstrates a lot of potential insider threat indicators. How can you protect your information when using wireless technology? How can you protect yourself from social engineering? Search for an answer or ask Weegy. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. Looking for https in the URL. What information posted publicly on your personal social networking profile represents a security risk? Log in for more information. It is getting late on Friday. When unclassified data is aggregated, its classification level may rise. What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited? Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. 1.1.1 Spillage. Ctrl+F (Cmd+F) will help you a lot when searching through such a large set of questions. Which of the following definitions is true about disclosure of confidential information? a. putting a child in time-out Remove and take it with you whenever you leave your workstation. Linda encrypts all of the sensitive data on her government issued mobile devices. What is the danger of using public Wi-Fi connections? Many apps and smart devices collect and share your personal information and contribute to your online identity. How many potential insider threat indicators is Bob displaying? *Spillage. What action should you take? What should you do? (Sensitive Information) What guidance is available from marking Sensitive Information information (SCI)? 1 Answer/Comment. c. What similarities and differences are there between plant and animal cells? Be aware of classification markings and all handling caveats. Phishing can be an email with a hyperlink as bait. Report the crime to local law enforcement.