The cover sheet should be removed prior to placing the document in the files. Maria received an assignment to support a project that requires access to classified information. **Social EngineeringWhich of the following is a way to protect against social engineering? 0000010569 00000 n What should you do? How can you guard yourself against Identity theft? internet. Which of the following is a wireless technology that enables your electronic devices to establish communications and exchange information when places next to each other called? Senior government personnel, military or civilian. Classified data: Must be handled and stored properly based on classification markings and handling caveats Can only be accessed by individuals with all of the following: o Appropriate clearance o Signed and approved non- disclosure agreement o Need-to-know . FranceFranceNorthWinery1903CostleadershipFranceFranceEastWinery1812CostleadershipEnglandFranceWestWinery1947CostleadershipU.S.France. 0000034293 00000 n Darryl is managing a project that requires access to classified information. Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. He has the appropriate clearance and a signed approved non-disclosure agreement. WebWhat is required for an individual to access classified data? E-mailing your co-workers to let them know you are taking a sick day. WebOnly persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Store classified data appropriately in a GSA-approved vault/container. Web(a) No person may be given access to classified information or material originated by, in the custody, or under the control of the Department, unless the person - (1) Has been determined to be eligible for access in accordance with sections 3.1-3.3 of Executive Order 12968; (2) Has a demonstrated need-to-know; and (3) Has signed an approved nondisclosure cyber. Webasked in Internet by voice (265k points) Question : Which of the following is true about unclassified data? All of the above. This information is summarized here. . WebClassified Information can only be accessed by individuals with All of the above Which of the following definitions is true about disclosure of confidential information? Spillage occurs when information is spilled from a higher classification or protection level to a lower classification or protection level. Which of the following individuals can access classified data? Classified material must be appropriately marked. How can you guard yourself against Identity theft? Protecting CUI . Many consumers are drinking more beer than wine with meals and at social occasions. Spillage occurs when information is spilled from a higher classification or protection level to a lower classification or protection level. 0000003786 00000 n He has the appropriate clearance and a signed approved non-disclosure agreement. Which of the following is a god practice to protect classified information? WebThere are a number of individuals who can access classified data. Which of the following is a best practice for physical security? consolidate in order to survive. hb```b``a`e`b`@ x`d`XV461ql04F;N8J(^ 1dIi&:=qA@ 1UPn l&% %@,f42@fg!s-fN+L! **Mobile DevicesWhich of the following is an example of removable media? Spillage occurs when information is spilled from a higher classification or protection level to a lower classification or protection level. Government owned PEDs if expressed authorized by your agency. *Insider ThreatWhat threat do insiders with authorized access to information or information systems pose?-They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. Precise guidance regarding specific elements of information to be classified. 0000005321 00000 n WebClassified data: Must be handled and stored properly based on classification markings and handling caveats Can only be accessed by individuals with all of the following: o Appropriate clearance o Signed and approved non- disclosure agreement o Need-to-know . Note any identifying information and the website's Uniform Resource Locator (URL). *Sensitive Compartmented InformationWhen is it appropriate to have your security badge visible? He has the appropriate clearance and a signed approved non-disclosure agreement. Web(a) No person may be given access to classified information or material originated by, in the custody, or under the control of the Department, unless the person - (1) Has been determined to be eligible for access in accordance with sections 3.1-3.3 of Executive Order 12968; (2) Has a demonstrated need-to-know; and (3) Has signed an approved nondisclosure If you participate in or condone it at any time. Structured data are usually human readable and can be indexed. **Classified DataHow should you protect a printed classified document when it is not in use? No, you should only allow mobile code to run from your organization or your organization's trusted sites. False Which of the following is NOT sensitive information? Any time you participate in or condone misconduct, whether offline or online. Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. How should you respond to the theft of your identity? Call your security point of contact immediately. WebDOL internal policy specifies the following security policies for the protection of PII and other sensitive data: It is the responsibility of the individual user to protect data to which they have access. What effect will this action have on Jarden's 2018 net income? A user writes down details from a report stored on a classified system restaurants. The email provides a website and a toll-free number where you can make a payment. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complain about the credit card bills that his wife runs up. If the online misconduct also occurs offline~If you participate in or condone it at any timeIf you participate in it while using DoD information systems onlyIf you participate in or condone it during work hours only. Determine if the software or service is authorized, Which of the following is an example of removable media. **Classified DataWhich classification level is given to information that could reasonably be expected to cause serious damage to national security? internet-quiz. In which situation below are you permitted to use your PKI token? It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. Avoid a potential security violation by using the appropriate token for each system. over the past five years, the French wine industry has not responded to changing consumer Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. When operationally necessary, owned by your organization, and approved by the appropriate authority. *SpillageWhich of the following may help to prevent spillage? 0000006207 00000 n He has the appropriate clearance and a signed approved non-disclosure agreement. **Insider ThreatWhat do insiders with authorized access to information or information systems pose? Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. New interest in learning a foreign language. You know that this project is classified. -Darryl is managing a project that requires access to classified information. Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. true-statement. A coworker has asked if you want to download a programmer's game to play at work. *Website UseWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? tastes. Only expressly authorized government-owned PEDs. *SpillageWhich of the following is a good practice to prevent spillage? What actions should you take when printing classified material within a Sensitive Compartmented Information Facility (SCIF)? **Website UseWhile you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? Spillage can be either inadvertent or intentional. Which of the following does a security classification guide provided? Webasked in Internet by voice (265k points) Question : Which of the following is true about unclassified data? *Social EngineeringWhat is a common indicator of a phishing attempt? Use only your personal contact information when establishing your account, *Controlled Unclassified InformationSelect the information on the data sheet that is personally identifiable information (PII) but not protected health information (PHI), Jane JonesSocial Security Number: 123-45-6789, *Controlled Unclassified InformationSelect the information on the data sheet that is protected health information (PHI), Interview: Dr. Nora BakerDr. WebClassified Information can only be accessed by individuals with All of the above Which of the following definitions is true about disclosure of confidential information? *Malicious CodeAfter visiting a website on your Government device, a popup appears on your screen. true-statement. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complain about the credit card bills that his wife runs up. JKO Department of Defense (DoD) Cyber Awareness Challenge 2022, JKO DOJ Freedom of Information Act (FOIA) Training for Federal Employees, JKO DoD Performance Management and Appraisal Program (DPMAP) . A pop-up window that flashes and warns that your computer is infected with a virus. Maria received an assignment to support a project that requires access to classified information. What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sites visited? How can you guard yourself against Identity theft? Calculate the advertising program's net present value, assuming an after-tax hurdle rate of 101010 percent. He has the appropriate clearance and a signed, approved non-disclosure agreement. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. WebWhich of the following individuals can access classified data? **Social EngineeringWhat is a common indicator of a phishing attempt? *Controlled Unclassified InformationWhich of the following is NOT an example of CUI? -Put the CD in the trash DoD employees are prohibited from using a DoD CAC in card-reader-enabled public devices. 0 Immediately notify your security POC. Store classified data appropriately in a GSA-approved vault/container. *SpillageWhat should you do if a reporter asks you about potentially classified information on the web? Darryl is managing a project that requires access to classified information. Maria received an assignment to support a project that requires access to classified information. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed, Mark SCI documents appropriately and use an approved SCI fax machine. Users must adhere to the rules of behavior defined in applicable Systems Security Plans, DOL and agency guidance. WebStore classified data appropriately in a GSA-approved vault/container. 290 33 0000001327 00000 n Increasing sales over the Internet have allowed consumers to better research the wines, A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. What should you do? Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. CUI may be stored on any password-protected system. *Insider Threat Which type of behavior should you report as a potential insider threat? You should only accept cookies from reputable, trusted websites. What should you do? Which of the following individuals can access classified data? Classified information is that which a government or agency deems sensitive enough to national security that access to it must be controlled and restricted. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification.Unclassified documents do not need to be marked as a SCIF.Only paper documents that are in open storage need to be marked. *TravelWhat security risk does a public Wi-Fi connection pose?-It may expose the connected device to malware. **Insider ThreatWhich of the following is NOT considered a potential insider threat indicator? industry. WebThings required to access classified information: Signed SF 312. **Classified DataWhich type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? The French wine industry is consolidating and consists of only 4 wineries today compared to 10 wineries five years ago. What type of activity or behavior should be reported as a potential insider threat? 1312.23 Access to classified information. As long as the document is cleared for public release, you may share it outside of DoD. WebBe aware of classification markings and all handling caveats. WebWhich of the following is NOT a criterion used to grant an individual access to classified data? *Classified Data Which of the following individuals can access classified data? Create separate user accounts with strong individual passwords. Web*Classified Data Which of the following individuals can access classified data?-Darryl is managing a project that requires access to classified information. Spillage can be either inadvertent or intentional. **TravelWhat security risk does a public Wi-Fi connection pose? *Sensitive Compartmented InformationWhat is Sensitive Compartmented Information (SCI)? What is a proper response if spillage occurs. WebWhat is required for an individual to access classified data? trailer What is a good practice for when it is necessary to use a password to access a system or an application? Who can be permitted access to classified data? data. An example is when an individual with access to classified information shares that vital information with a journalist who then releases it. On a NIPRNet system while using it for a PKI-required task. Darryl is managing a project that requires access to classified information. It may expose the connected device to malware. Which of the following is an example of near field communication (NFC)?-A smartphone that transmits credit card payment information when held in proximity to a credit card reader. Required Need-to-know. Prepare the adjusting entry to record bad debts expense at December 31, 2017. Data format data can be either structured or unstructured. Users must adhere to the rules of behavior defined in applicable Systems Security Plans, DOL and agency guidance. What should you do when you are working on an unclassified system and receive an email with a classified attachment? 0000001952 00000 n **Social NetworkingWhich of the following information is a security risk when posted publicly on your social networking profile? Mary Smith, a Level II CFA candidate, was recently hired for an analyst position at the Bank of Ireland. Remove your security badge after leaving your controlled area or office building. Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. Refer the reporter to your organization's public affair office. Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? by producing wine in bottles with curved necks, which increases its cost structure. & \text { Cost leadership } & \text { Cost leadership } & \text { Cost leadership } \\ **TravelWhat is a best practice while traveling with mobile computing devices? *Sensitive Compartmented InformationWhich must be approved and signed by a cognizant Original Classification Authority (OCA)? Label all files, removable media, and subject headers with appropriate classification markings. Data format data can be either structured or unstructured. 322 0 obj <>stream *Sensitive Compartmented InformationWhich of the following best describes the compromise of Sensitive Compartmented Information (SCI)? (shouldn't this be reported to security POC?). **Use of GFEWhat is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? Where would you direct him to obtain benchmarking data to help him with his assessment? *SpillageAfter reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Regardless of state, data classified as confidential must remain confidential. Electronic Code of Federal Regulations (e-CFR), CHAPTER III - OFFICE OF MANAGEMENT AND BUDGET, PART 1312 - CLASSIFICATION, DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION, Subpart B - Control and Accountability of Classified Information. classified-document. Research the source of the article to evaluate its credibility and reliability. Jarden prepares a schedule of its December 31, 2017, accounts receivable by age. Regardless of state, data classified as confidential must remain confidential. Protecting CUI . You should only accept cookies from reputable, trusted websites. Transmissions must be between Government e-mail accounts and must be encrypted and digitally signed when possible. Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? No, you should only allow mobile code to run from your organization or your organization's trusted sites. Which of the following is the best example of Personally Identifiable Information (PII)? bargaining power over the industry? How can you protect yourself from internet hoaxes? Senior government personnel, military or civilian. Allegience Insurance Company's management is considering an advertising program that would require an initial expenditure of $165,500\$ 165,500$165,500 and bring in additional sales over the next five years. \hline \text { Founding date } & 1750 & 1903 & 1812 & 1947 \\ Allegience's tax rate is 404040 percent. assertions before publishing the final draft of her report. Report the crime to local law enforcement, A type of phishing targeted at senior officials. **Social EngineeringWhat is TRUE of a phishing attack? How many potential insiders threat indicators does this employee display. WebTheodore is seeking access to classified information that he does not need to know to perform his job duties. cyber. **Classified DataWhich of the following is true of protecting classified data? He has the appropriate clearance and a signed, approved non-disclosure agreement. What must users ensure when using removable media such as a compact disk (CD)? & \text { South Winery } & \text { North Winery } & \text { East Winery } & \text { West Winery } \\ Mark SCI documents, appropriately and use an approved SCI fax machine. Winery as a stuck-in-the-middle firm. Explain. How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? **Physical SecurityAt which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? Always use DoD PKI tokens within their designated classification level. WebDOL internal policy specifies the following security policies for the protection of PII and other sensitive data: It is the responsibility of the individual user to protect data to which they have access. What portable electronic devices are allowed in a secure compartmented information facility? Phishing can be an email with a hyperlink as bait. FoundingdateGenericcompetitivestrategyMajorcustomermarket(morethan80%concentration)ProductionsiteSouthWinery1750? In setting up your personal social networking service account, what email address should you use? A type of phishing targeted at senior officials. into distinct operating units, with each unit pursuing a different competitive strategy. Smith Ask the caller, "What's your full name and phone number?". **Insider ThreatHow many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? To protect CUI: Properly mark all CUI Hostility and anger toward the United States and its policies. 0000011071 00000 n the compressed URL may be masking malicious intent- What is the best choice to describe what has occurred? On June 30, 2018, Jarden Company concludes that a customer's$4,750 receivable (created in 2017) is uncollectible and that the account should be written off. False Which of the following is NOT sensitive information? He has the appropriate clearance and a signed, approved non-disclosure agreement. *Social NetworkingWhich of the following is a security best practice when using social networking sites? Which of Smiths points effectively support the conclusion that consumers have strong Need-to-know is a determination that an individual requires access to specific classified information in the performance of (or assist in the performance of) lawful and authorized government functions and duties. He has the appropriate clearance and a signed, approved, non-disclosure agreement. WebWhich of the following individuals can access classified data Cyber Awareness 2022? When is it appropriate to have your securing badge visible with a sensitive compartmented information facility. CostleadershipCostleadershipCostleadershipMajorcustomermarket(morethan80%concentration)FranceFranceEnglandU.S.ProductionsiteFranceFranceFranceFrance\begin{array}{lcccc} 0000007852 00000 n Hostility or anger toward the United States and its policies. *Insider ThreatWhich of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? Darryl is managing a project that requires access to classified information. 2.2.2. Which classified level is given to information that could reasonably be expected to cause serious damage to national security? wine at a time. 0000001676 00000 n Clearance eligibility at the appropriate level. **Classified DataWhat level of damage can the unauthorized disclosure of information classified as Confidential reasonably be expected to cause? true traveling overseas mobile phone cyber awareness. **Identity ManagementYour DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. Is it acceptable to take a short break while a coworker monitors your computer while logged on with your Common Access Card (CAC)? Malicious code: WebBe aware of classification markings and all handling caveats. **Insider ThreatBased on the description that follows, how many potential insider threat indicator(s) are displayed? Which of the following is a god practice to protect classified information? The end Label all files, removable media, and subject headers with appropriate classification markings.