The following practices help prevent viruses and the downloading of malicious code except. <>/Metadata 326 0 R/ViewerPreferences 327 0 R>> *SpillageWhat is a proper response if spillage occurs? Do not use any personally owned/non-organizational removable media on your organizations systems. *SpillageWhat should you do when you are working on an unclassified system and receive an email with a classified attachment? Spear Phishing attacks commonly attempt to impersonate email from trusted entities. *Social NetworkingYour cousin posted a link to an article with an incendiary headline on social media. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Which is true for protecting classified data? 0 Suppose a sales associate told you the policy costs$650,000. 0000011226 00000 n DoD employees are prohibited from using a DoD CAC in card-reader-enabled public devices. *Sensitive Compartmented InformationWhen should documents be marked within a Sensitive Compartmented Information Facility (SCIF), ~All documents should be appropriately marked, regardless of format, sensitivity, or classification.Unclassified documents do not need to be marked as a SCIF.Only paper documents that are in open storage need to be marked.Only documents that are classified Secret, Top Secret, or SCI require marking. **Removable Media in a SCIFWhat portable electronic devices (PEDs) are allowed in a Sensitive Compartmented Information Facility (SCIF)? **Identity ManagementYour DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. -Classified material must be appropriately marked. Maria is at home shopping for shoes on Amazon.com. Which of the following is NOT considered a potential insider threat indicator? Any individual who falls to meet these requirements is not authorized to access classified information. *UNCONTROLLED CLASSIFIED INFORMATION*Which of the following is NOT an example of CUI? What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered? 0000005657 00000 n **Social NetworkingWhat should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sires visited? ), BUSINESSSOLUTIONSComparativeBalanceSheetDecember31,2017,andMarch31,2018\begin{array}{c} It may expose the connected device to malware. The email states your account has been compromised and you are invited to click on the link in order to reset your password. Which of the following is a security best practice when using social networking sites?-Turn off Global Positioning System (GPS) before posting pictures of yourself in uniform with identifiable landmarks. xref You believe that you are a victim of identity theft. There are a number of individuals who can access classified data. In which situation below are you permitted to use your PKI token? At the 0.050.050.05 level of significance, is there a significant quadratic relationship between torque and RPM? Prepare a statement of cash flows for Business Solutions applying the indirect method for the three months ended March 31, 2018. *Malicious CodeWhat are some examples of malicious code? Which of the following is NOT considered a potential insider threat indicator? What can help to protect the data on your personal mobile device? What should you do? A coworker has asked if you want to download a programmer's game to play at work. BUSINESSSOLUTIONSComparativeBalanceSheetDecember31,2017,andMarch31,2018, BUSINESSSOLUTIONSIncomestatementForThreeMonthsEndedMarch31,2018\begin{array}{c} Never allow sensitive data on non-Government-issued mobile devices. What should be your response? Digitally signing e-mails that contain attachments or hyperlinks. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. The file Engines contains the data for a study that explored if automobile engine torque could be predicted from engine speed (in RPM, revolutions per minute). You know this project is classified. What action should you take? hbb2``b``3 v0 Be aware of classification markings and all handling caveats. A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. You have reached the office door to exit your controlled area. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification.Unclassified documents do not need to be marked as a SCIF.Only paper documents that are in open storage need to be marked. *Controlled Unclassified InformationWhich of the following is NOT an example of CUI? Use a common password for all your system and application logons. Baker was Ms. Jones's psychiatrist for three months. Insiders are given a level of trust and have authorized access to Government information systems. Pictures of your petYour birthdayYour hobbies~Your personal e-mail address. endstream endobj 321 0 obj <>/Filter/FlateDecode/Index[54 236]/Length 31/Size 290/Type/XRef/W[1 1 1]>>stream DEPARTMENT OF DEFENSE ORGANIZATION questions with answers 2023. It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. endobj Be aware of classification markings and all handling caveats. Attempting to access sensitive information without a need-to-know. true traveling overseas mobile phone cyber awareness. What action should you take first? Based on the description that follows how many potential insider threat indicators are displayed? They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. Which of the following is true about unclassified data? How do you respond? 0000002497 00000 n Use TinyURLs preview feature to investigate where the link leads. CUI may be stored on any password-protected system. "Y% js&Q,%])*j~,T[eaKC-b(""P(S2-@&%^HEFkau"[QdY <> What are some actions you can take to try to protect your identity? Darryl is managing a project that requires access to classified information. \textbf{BUSINESS SOLUTIONS}\\ Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. Sensitive information may be stored on any password-protected system. When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. Which of the following is a god practice to protect classified information? You must possess security clearance eligibility to telework. 5 0 obj -Looking for "https" in the URL. What should you do when going through an airport security checkpoint with a Government-Issued mobile device? Someone calls from an unknown number and says they are from IT and need some information about your computer. As long as the document is cleared for public release, you may share it outside of DoD. 2. An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? !LL"k)BSlC ^^Bd(^e2k@8alAYCz2QHcts:R+w1F"{V0.UM^2$ITy?cXFdMx Y8> GCL!$7~Bq|J\> V2 Y=n.h! Thumb drives, memory sticks, and optical disks. 0000034293 00000 n Which of the following is NOT a potential insider threat? The email provides a website and a toll-free number where you can make payment. *HOME COMPUTER SECURITY*Which of the following is a best practice for securing your home computer? What is the best response if you find classified government data on the internet? There are many travel tips for mobile computing. Protecting CUI . Refer the reporter to your organization's public affairs office. **Classified DataWhich classification level is given to information that could reasonably be expected to cause serious damage to national security? On a NIPRNET system while using it for a PKI-required task. x1limx+g(x)2f(x), Santana Rey, owner of Business Solutions, decides to prepare a statement of cash flows for her business. What is required for an individual to access classified data? It can cause damage by corrupting files, erasing your hard drive, and/or allowing hackers access. *Sensitive Compartmented InformationWhat guidance is available for marking Sensitive Compartmented Information (SCI)? *Classified DataWhich of the following individuals can access classified data? *Sensitive Compartmented InformationWhen faxing Sensitive Compartmented Information (SCI), what actions should you take? *Social EngineeringWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)?-Investigate the links actual destination using the preview feature. limx12f(x)x+g(x)\lim\limits_{x\rightarrow1}\frac{2-f(x)}{x+g(x)} 10 0 obj How many potential insiders threat indicators does this employee display? He has the appropriate clearance and a signed, approved, non-disclosure agreement. Neither confirm or deny the information is classified. Which is a good practice to protect classified information? On a NIPRNet system while using it for a PKI-required task. Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. To formalize and stratify the process of securing data based on assigned labels of importance and sensitivity C. To establish a transaction trail for auditing accountability D. To manipulate access controls to provide for the most efficient means to grant or restrict functionality **Classified DataWhat is required for an individual to access classified data? Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. Research the source of the article to evaluate its credibility and reliability. <> **Physical SecurityWhich Cyber Protection Condition (CPCON) is the priority focus on critical and essential functions only? Within a secure area, you see an individual you do not know. Spillage because classified data was moved to a lower classification level system without authorization. **Classified DataWhat level of damage can the unauthorized disclosure of information classified as Confidential reasonably be expected to cause? When is conducting a private money-making venture using your Government-furnished computer permitted? Follow instructions given only by verified personnel.

Someone Who Intentionally Provokes You, How Much Did John Wayne Weigh At Birth, Superstition Mountain Hiking, Huron County Glyph Reports, Articles W

which of the following individuals can access classified dataLEAVE A REPLYYour email address will not be published. Required fields are marked *Your Name

Office No. C1701 07 & 08 Ontario Tower, Business Bay,
Sat - Thu: 9 AM - 6 PM
© Axis Point 2022. All Rights Reserved | Design & Develop By michael kahn obituary