Only connect via an Ethernet cable. **Identity management What is the best way to protect your Common Access Card (CAC)? correct. Your comments are due on Monday. Equipment which is Government-provided will be furnished and installed by the Government in space made available by the Contractor and with rough-in made by the Contractor in accord with the information made available or referenced herein or indicated. Secure .gov websites use HTTPSA correct. Which of the following is NOT considered sensitive information? Which of the following actions is appropriate after finding classified Government information on the internet? *Sensitive Information Which of the following is the best example of Personally Identifiable Information (PII)? **Classified Data Which classification level is given to information that could reasonably be expected to cause serious damage to national security? Store it in a General Services Administration (GSA)-approved vault or container. What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)? Which of the following is NOT an appropriate way to protect against inadvertent spillage? Only paper documents that are in open storage need to be marked. A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. a. We reserve the right to exclude a supplier whos been convicted of any of the offences or misconduct listed in the statement relating to good standing that will be sent to you if youre successful under a DASA competition. Only use Government-furnished or Government-approved equipment to process CUI, including PII. Which of the following individuals can access classified data? This HHS Policy supersedes the CMS ARS 3.0 CM-2 Enhancement 7 Configure Systems or Components for High Risk Areas control. where there would be significant financial or quality benefits to the work as a result of using GFA). Which of the following is NOT an example of Personally Identifiable Information (PII)? Set hasDigit to true if the 3-character passCode contains a digit, Critical, Essential, and Support Functions. How are Trojan horses, worms, and malicious scripts spread? It may be compromised as soon as you exit the plane. Bob, a coworker, has been going through a divorce, has financial difficulties and is displaying hostile behavior. Serious damage c. Exceptionally grave damage. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. Do not access website links, buttons, or graphics in e-mail. what should you do? Describe the major components of the strategic management process. \text{Retained Earnings}&&&\text{Credit}\\ hbbd``b` $gE@eHLD tk%bUHT 9L,,F|` &1/ What type of social engineering targets senior officials? The CAC/PIV is a controlled item and contains certificates for: An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? &\textbf{Increas}&\textbf{Decrease}&\textbf{Normal Balance}\\ Which of the following is NOT one? The job cost sheet for Job 413 shows that $12,000 in direct materials has been used on the job and that$8,000 in direct labor cost has been incurred. Ask probing questions of potential network contacts to ascertain their true identity c. Avoid talking about work outside of the workplace or with people without need-to-know. The email provides a website and a toll-free number where you can make payment. Family and relationships - Friends Only How many potential insiders threat indicators does this employee display? Porton Down Read more about MOD ethical approval and other regulations which may affect your work. *Sensitive Information Which of the following is an example of Protected Health Information (PHI)? \text{Income statement accounts:}&&&\\ Use only your personal contact information when establishing your account. Which of the following is true of using DoD Public key Infrastructure (PKI) token? Making unauthorized configuration changes. Controlled Unclassified Information (CUI). While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. It wont be used for other purposes, without us having obtained the necessary rights and permissions to do so. **Social Networking Which of the following is a security best practice when using social networking sites? Illegal downloading copyrighted materials. (Sensitive Information) What guidance is available from marking Sensitive Information information (SCI)? \text{Balance sheet accounts:}\\ Travel (Incident): What should Sara do when using publicly available Internet, such as hotel Wi-Fi? Note the websites URL and report the situation to your security point of contact. . What is the danger of using public Wi-Fi connections? Home Computer Security (Evidence): Antivirus alert. Which of the following is true of removable media and portable electronic devices (PEDs)? Insiders are given a level of trust and have authorized access to Government information systems. **Insider Threat How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? CUI must be handled using safeguarding or dissemination controls. Which of the following is true of the Common Access Card (CAC)? What level of damage can the unauthorized disclosure of information classified as Top Secret reasonably be expected to cause? Hk0 Q*Xo(6f/U@cvwrR5dsGw'Wd^4yL)$v6 BZpFC4ir'JvJ%(# Wi/C5*SR-xErYAFh Jr4` '3Pp9iSVH,=#}g()fD-g-xV`p96~cm LI o )^7;y^ **Social Engineering Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Do not access website links in e-mail messages. What should you do? Which of the following is a good practice to protect classified information? wR7 l. Which of the following is NOT sensitive information? Correct. Which is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF). Immediately notify your security point of contact. . *Sensitive Compartmented Information When faxing Sensitive Compartmented Information (SCI), what actions should you take? CUI may be stored on any password-protected system. If youre requesting interim payments you must comply with the following: Government Furnished Assets (GFA) could be equipment, information or resources that are government-owned and loaned (on a free-of-charge basis) to a contractor to assist in the completion of the contract. There is no way to know where the link actually leads. Which of the following is a reportable insider threat activity? Nothing. Write your password down on a device that only you access. Sensitive Compartmented Information (Incident #2): What should the owner of this printed SCI do differently? *Controlled Unclassified Information Which of the following is NOT an example of CUI? Photos of your pet Correct. what should be your response be? After being diagnosed with pyrophobia, the client states, "I believe this started at the age of 7 when I was trapped in a house fire." *Spillage A user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. Enable automatic screen locking after a period of inactivity. (social networking) When may you be subjected to criminal, disciplinary, and/or administrative action due to online misconduct? When may you be subject to criminal, disciplinary, and/or administrative action due to online harassment, bullying, stalking, hazing, discrimination, or retaliation? Use the classified network for all work, including unclassified work. Exceptionally grave damage to national security. Understanding and using the available privacy settings. Which of the following demonstrates proper protection of mobile devices? What information most likely presents a security risk on your personal social networking profile? Mark SCI documents appropriately and use an approved SCI fax machine. Consider the various information sources listed previously in developing your answer. You receive an inquiry from a reporter about potentially classified information on the internet. You receive an unexpected email from a friend: I think youll like this: https://tinyurl.com/2fcbvy. What action should you take? Use of GFE (Incident): Permitted Uses of Government-Furnished Equipment (GFE) A No to all: Viewing or downloading pornography, gambling online, conducting a private money-making venture, using unauthorized software, Illegally downloading copyrighted material, making unauthorized configuration changes. Which of the following is true of the Common Access Card (CAC) or Personal Identity Verification (PIV) card? (Malicious Code) Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? In your opinion, will there be individual differences? *Spillage Which of the following is a good practice to aid in preventing spillage? What type of attack might this be? Which of the following should you do immediately? Validate friend requests through another source through another source before confirming them. What should Sara do when using publicly available Internet, such as hotel Wi-Fi? Which of the following is a clue to recognizing a phishing email? **Social Engineering Which may be a security issue with compressed Uniform Resource Locators (URLs)? The proper security clearance and indoctrination into the SCI program. **Use of GFE When can you check personal e-mail on your Government-furnished equipment (GFE)? Which of the following may help to prevent spillage? (Sensitive Information) What certificates are contained on the Common Access Card (CAC)? What should Sara do when publicly available Internet, such as hotel Wi-Fi? On a NIPRNET system while using it for a PKI-required task. Y"{+lr)v&e]8OMoUBgT+E G +$f}'@$c(QxE'{=Q[M{Qdf7N*1^1zyti#;@_r+~>(.D$!yn@L3pgA0#Dk(-]+utfoZaF0gyz=l%Ec\'"]e:7i/-L(*#Nw%r0I3Km@ P@Ya5 $ .nlPE*k8]xkh0D!_/~CyVIS *Spillage Which of the following may help prevent inadvertent spillage? Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. Photos and videos you are in - Friends Only Select the appropriate setting for each item. Classification markings and handling caveats. *Social Networking Explain why. endstream endobj 1072 0 obj <>stream If you receive a phone call from a stranger asking for information about your invoice payment process, you should: Crucial information about a user or organization can be gained through. Which of the following best describes the conditions under which mobile devices and applications can track your location? Well use the email address that you used to create your account and the telephone number in your profile to contact you. <>/Metadata 317 0 R/ViewerPreferences 318 0 R>> d. All of these. What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? You must have your organizations permission to telework. 2 0 obj When can you check personal email on your government furnished equipment? What describes how Sensitive Compartmented Information is marked? It may expose the connected device to malware. A coworker is observed using a personal electronic device in an area where their use is prohibited. Only paper documents that are in open storage need to be marked. Conducting a private g*mbling online. used in telework environments in accordance with reference (b). Share sensitive information only on official, secure websites. Physical Security: (Incident #1): What should the employee do differently? CUI must be handled using safeguarding or dissemination controls.
Female Country Singers Of The 2000s, Nursing Education Practicum Documentation, Governor Kemp Daughter Accident, Articles P