which of the following individuals can access classified data

Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Which of the following terms refers to someone who harms national security through authorized access to information system? *Sensitive Compartmented InformationWhen is it appropriate to have your security badge visible? **Social NetworkingYour cousin posted a link to an article with an incendiary headline on social media. Digitally signing e-mails that contain attachments or hyperlinks. Report the crime to local law enforcement. What can you do to protect yourself against phishing? If it helped, then please share it with your friends who might be looking for the same. Dr. Stanisky was Ms. Jones psychiatrist for three months.Dr. Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. **Insider ThreatWhat type of activity or behavior should be reported as a potential insider threat? Which of the following is an example of malicious code? Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. <> endobj Darryl is managing a project that requires access to classified information. Bundle contains 9 documents. If classified information were released, which classification level would result in "Exceptionally grave damage to national security"? Lock your device screen when not in use and require a password to reactivate. **Social EngineeringWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? <> -Store it in a shielded sleeve to avoid chip cloning. Medical Ethics and Detainee Operations Basic Course (5hrs) . A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. **Physical SecurityWhich Cyber Protection Condition (CPCON) is the priority focus on critical and essential functions only? Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. *Sensitive Compartmented InformationWhen faxing Sensitive Compartmented Information (SCI), what actions should you take? 0000011226 00000 n eZkF-uQzZ=q; *SOCIAL NETWORKING*When is the safest time to post details of your vacation activities on your social networking profile? CUI may be stored on any password-protected system. *Sensitive InformationWhich of the following is the best example of Personally Identifiable Information (PII)? Which type of information includes personal, payroll, medical, and operational information? What is the best example of Personally Identifiable Information (PII)? Which is NOT a wireless security practice? A coworker removes sensitive information without approval. -Linda encrypts all of the sensitive data on her government-issued mobile devices. **Mobile DevicesWhich of the following is an example of removable media? Which of the following makes Alex's personal information vulnerable to attacks by identity thieves? You are reviewing your employees annual self evaluation. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. How can you protect yourself from social engineering?-Follow instructions given only by verified personnel. <> Is it acceptable to take a short break while a coworker monitors your computer while logged on with your CAC? *MOBILE DEVICES*Which of the following is an example of near field communication (NFC)? Her badge is not visible to you. 322 0 obj <>stream -Ask them to verify their name and office number. A colleague vacations at the beach every year, is married and a father of four, sometimes has poor work quality, and works well with his team. *Sensitive Compartmented InformationWhat guidance is available for marking Sensitive Compartmented Information (SCI)? Which of the following individuals can access classified data? Mark SCI documents appropriately and use an approved SCI fax machine. *Classified DataWhich of the following individuals can access classified data? *SpillageWhich of the following may help prevent inadvertent spillage? Which of the following attacks target high ranking officials and executives? What advantages do insider threats have over others that allows them to be able to do extraordinary damage to their *SENSITIVE COMPARTMENTED INFORMATION*When faxing Sensitive Compartmented Information (SCI), what actions should you take? Investigate the link's actual destination using the preview feature. They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. *Sensitive Compartmented InformationWhat should the owner of this printed SCI do differently? A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. You receive a call on your work phone and you're asked to participate in a phone survey. *Sensitive InformationUnder which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? *SpillageAfter reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Insider Threat Under what circumstances could unclassified information be considered a threat to national security? Which of these is true of unclassified data?-Its classification level may rise when aggregated. Government-owned PEDs when expressly authorized by your agency. *Mobile Devices **Insider ThreatWhat type of activity or behavior should be reported as a potential insider threat? Ask the individual to see an identification badge. Evaluate the causes of the compromiseE-mail detailed information about the incident to your security point of contact (Wrong)Assess the amount of damage that could be caused by the compromise~Contact your security point of contact to report the incident. endobj *Mobile Devices Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? You receive an unexpected email from a friend: I think youll like this: https://tinyurl.com/2fcbvy. What action should you take? Which of the following is an example of Protected Health Information (PHI)? **Social NetworkingWhich of the following best describes the sources that contribute to your online identity? "QM_f Y 74u+&e!6>)w/%n(EtQ(j]OP>v+$bH5RKxHC ?gj%}"P97;POeFN-2P&^RSX)j@*6( hbb2``b``3 v0 He has the appropriate clearance and a signed approved non-disclosure agreement. Someone calls from an unknown number and says they are from IT and need some information about your computer. A type of phishing targeted at high-level personnel such as senior officials. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complain about the credit card bills that his wife runs up. When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. You are logged on to your unclassified computer and just received an encrypted email from a co-worker. 290 33 What is the best response if you find classified government data on the internet? What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure? What should you do? 0000000016 00000 n What should be done if you find classified Government Data/Information Not Cleared for Public Release on the Internet? Call your security point of contact immediately. Which of the following individuals can access classified data Cyber Awareness 2022? Which may be a Security issue with compressed Uniform Resource Locators (URLs)? What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? \textbf{BUSINESS SOLUTIONS}\\ \text{Dep. Use only personal contact information when establishing personal social networking accounts, never use Government contact information. Which of the following individuals can access classified data? When would be a good time to post your vacation location and dates on your social networking website? DEPARTMENT OF DEFENSE ORGANIZATION questions with answers 2023. What does Personally Identifiable Information (PII) include? endobj What should you consider when using a wireless keyboard with your home computer? Which of the following is NOT a correct way to protect sensitive information? <> xref **Identity managementWhich of the following is an example of a strong password? A colleague saves money for an overseas vacation every year, is a single father, and occasionally consumes alcohol. Which of following is true of protecting classified data? Spillage because classified data was moved to a lower classification level system without authorization. This article will provide you with all the questions and answers for Cyber Awareness Challenge. What is a possible indication of a malicious code attack in progress? *WEBSITE USE*Which of the following statements is true of cookies? What should you do if a commercial entity, such as a hotel reception desk, asks for Government identification so that they can make a photocopy? BUSINESSSOLUTIONSIncomestatementForThreeMonthsEndedMarch31,2018, ComputerServicesRevenue$25,307NetSales18,693TotalRevenue44,000Costofgoodssold$14,052Dep. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. Which of the following is NOT a criterion used to grant an individual access to classified data? You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). At the 0.050.050.05 level of significance, is there a significant quadratic relationship between torque and RPM? What is considered ethical use of the Government email system? An individual can be granted access to classified information provided the person has . %%EOF 3. Dr. Baker reports that the sessions addressed Ms. Jones's depression, which poses no national security risk. endobj startxref *Mobile DevicesWhat can help to protect the data on your personal mobile device? Which of the following is NOT a best practice to preserve the authenticity of your identity? Lock your device screen when not in use and require a password to reactivate. Interview: Dr. Martin Stanisky All https sites are legitimate. How many indicators does this employee display? Refer the reporter to your organizations public affairs office. **Classified DataWhen classified data is not in use, how can you protect it? **Classified DataWhat is required for an individual to access classified data? It may expose the connected device to malware. \text{Computer Services Revenue}&&\$25,307\\ \end{array} x\[o8~G{(EELMT[N-5s/-rbtv0qm9$s'uzjxOf Note any identifying information and the website's Uniform Resource Locator (URL). Which of the following should be reported as a potential security incident (in accordance with your Agencys insider threat policy)? <>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/MediaBox[ 0 0 612 792] /Contents 4 0 R/Group<>/Tabs/S/StructParents 0>> Classified material must be appropriately marked. What action should you take? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. Immediately notify your security point of contact. ), BUSINESSSOLUTIONSComparativeBalanceSheetDecember31,2017,andMarch31,2018\begin{array}{c} The potential for unauthorized viewing of work-related information displayed on your screen. What should you do? A colleague asks to leave a report containing Protected Health Information (PHI) on his desk overnight so he can continue working on it the next day. -Potential Insider Threat It is getting late on Friday. **Classified DataWhat is a good practice to protect classified information? endobj Only allow mobile code to run from your organization or your organizations trusted sites. - CUI is an umbrella term that encompasses many different markings to identify information that is not classified but which should be protected. Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. Which of the following is NOT an example of CUI? Select the information on the data sheet that is protected health information (PHI). \text{Repairs expense - computer}&\underline{~~~~~~~960}\\ A medium secure password has at least 15 characters and one of the following. *Malicious Code Sensitive information may be stored on any password-protected system. <> Use antivirus software and keep it up to date. No, you should only allow mobile code to run from your organization or your organization's trusted sites. Mark SCI documents appropriately and use an approved SCI fax machine. -Remove and take it with you whenever you leave your workstation. Store classified data appropriately in a GSA-approved vault/container. exp-officeequip.400Dep. Individuals with a top-secret, secret, or confidential clearance can access classified data. *Sensitive Compartmented InformationWhat must the dissemination of information regarding intelligence sources, methods, or activities follow? Avoid using the same password between systems or applications. \text{Net income}&&\underline{\underline{~\$18,833}}\\ Your health insurance explanation of benefits (EOB). *TravelWhat security risk does a public Wi-Fi connection pose? What should you do? **Insider ThreatWhich scenario might indicate a reportable insider threat? What type of activity or behavior should be reported as a potential insider threat? 2001. **Insider ThreatHow many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? Mark SCI documents, appropriately and use an approved SCI fax machine. Follow instructions given only by verified personnel. Reviewing and configuring the available security features, including encryption. 0000007852 00000 n **Removable Media in a SCIFWhat portable electronic devices (PEDs) are allowed in a Sensitive Compartmented Information Facility (SCIF)? **Social EngineeringWhich may be a security issue with compressed Uniform Resource Locators (URLs)? *Mobile DevicesWhat can help to protect data on your personal mobile device?-Secure it to the same level as Government-issued systems. Which of the following is NOT an appropriate way to protect against inadvertent spillage?-Use the classified network for all work, including unclassified work. \text{Cost of goods sold}&\$14,052\\ Ask for information about the website, including the URL. *Sensitive Compartmented Information A coworker uses a personal electronic device in a secure area where their use is prohibited. What is the best description of two-factor authentication? What is a proper response if spillage occurs? 0000005454 00000 n *TRAVEL*Which of the following is a concern when using your Government-issued laptop in public? Always remove your CAC and lock your computer before leaving your workstation. Which cyber protection condition (CPCON) establishes a protection priority focus on critical and essential functions only? Darryl is managing a project that requires access to classified information. How can you protect your information when using wireless technology? Investigate the link's actual destination using the preview feature. endobj **Identity managementWhat is the best way to protect your Common Access Card (CAC)? What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? An individual can be granted access to classified information provided the following criteria are satisfied? Social Security Number; date and place of birth; mothers maiden name. -Senior government personnel, military or civilian. **Social NetworkingWhen may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? \text{Wages expense}&3,250\\ endobj Which of the following is NOT a home security best practice? This can be of particular importance for risk management, legal discovery and regulatory compliance. What are some examples of removable media? 0000001327 00000 n You should only accept cookies from reputable, trusted websites. *Sensitive Compartmented InformationWhen is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF)? What should be your response? *Social Engineering Wq2m\T>]+6/U\CMOC(\eGLF:3~Td8`c>S^`0TBj8J@/*v;V,~){PfL"Ya)7uukjR;k2\R(9~4.Wk%L/~;|1 K\2Hl]\q+O_Zq[ykpSX.6$^= oS+E.S BH+-Ln(;aLXDx) CUI may be stored on any password-protected system. true traveling overseas mobile phone cyber awareness. A type of phishing targeted at high-level personnel such as senior officials. Using webmail may bypass built in security features. Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? Government-owned PEDs when expressly authorized by your agency. No. *Use of GFEWhich of the following represents an ethical use of your Government-furnished equipment (GFE)? What organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities? 0000004517 00000 n Determine if the software or service is authorized. endobj **Classified DataWhich of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? 5 0 obj Something you possess, like a CAC, and something you know, like a PIN or password. Below are most asked questions (scroll down). -Look for a digital signature on the email. Darryl is managing a project that requires access to classified information. **Use of GFEWhen can you check personal e-mail on your Government-furnished equipment (GFE)? What should you do? *Identity Management A. **Social NetworkingAs someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? Government-owned PEDs, if expressly authorized by your agency. What is a best practice to protect data on your mobile computing device? Write your password down on a device that only you access (e.g., your smartphone). Which of the following is NOT Protected Health Information (PHI)? Traumatic Brain Injury (TBI) Awareness for Deploying Leaders and Commanders CBT Questions and Answers. Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. *SpillageWhat is a proper response if spillage occurs? He has the appropriate clearance and a signed, approved, non-disclosure agreement. -Remove security badge as you enter a restaurant or retail establishment. 11 0 obj **Social NetworkingWhen is the safest time to post details of your vacation activities on your social networking website? @870zpVxh%X'pxI[r{+i#F1F3020d`_ if>}xp20Nj9: bL Which of the following is NOT a typical means for spreading malicious code? **Classified DataWhich of the following is a good practice to protect classified information? **Classified DataWhich of the following is true of telework? Which of the following terms refers to harm inflicted on national security through authorized access to information or information systems? **Website UseWhich of the following statements is true of cookies? On a NIPRNet system while using it for a PKI-required task. Encrypt the e-mail and use your Government e-mail account. All https sites are legitimate and there is no risk to entering your personal info online. What security risk does a public Wi-Fi connection pose? Be aware of classification markings and all handling caveats. Classified information may be made available to a person only when the possessor of the information establishes that the person has a valid "need to know" and the access is essential to the accomplishment of official government duties. *Malicious CodeWhat is a possible effect of malicious code?-Files may be corrupted, erased, or compromised. -Sanitized information gathered from personnel records. When faxing Sensitive Compartmented Information (SCI), what actions should you take? *UNCONTROLLED CLASSIFIED INFORMATION*Which of the following is NOT a correct way to protect CUI? An unsecured IoT device can become an attack vector to any other device on your home network, including your Government laptop. Insiders are given a level of trust and have authorized access to Government information systems. *SpillageWhich of the following is a good practice to aid in preventing spillage? When is conducting a private money-making venture using your Government-furnished computer permitted? Which of the following should be done to keep your home computer secure? What information posted publicly on your personal social networking profile represents a security risk? You should only accept cookies from reputable, trusted websites. a.) In setting up your personal social networking service account, what email address should you use? *Home Computer SecurityWhich of the following is a best practice for securing your home computer?-Create separate accounts for each user. New interest in learning a foregin language. A coworker has asked if you want to download a programmers game to play at work. A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. *Sensitive Compartmented InformationWhen should documents be marked within a Sensitive Compartmented Information Facility (SCIF), ~All documents should be appropriately marked, regardless of format, sensitivity, or classification.Unclassified documents do not need to be marked as a SCIF.Only paper documents that are in open storage need to be marked.Only documents that are classified Secret, Top Secret, or SCI require marking. 0000000975 00000 n 20 0 obj A program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. Annual DoD Cyber Awareness Challenge Exam graded A+ already passed. What should you do if a reporter asks you about potentially classified information on the web? You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. Connect to the Government Virtual Private Network (VPN). How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Which of the following is a potential insider threat indicator? **Insider ThreatWhat advantages do insider threats have over others that allows them to cause damage to their organizations more easily? What should you do after you have ended a call from a reporter asking you to confirm potentially classified information found on the web? Upon connecting your Government- issued laptop to a public wireless connection, what should you immediately do? %PDF-1.4 % What is an indication that malicious code is running on your system? How many potential insiders threat indicators does this employee display? You know this project is classified. Which is true for protecting classified data? **Insider ThreatWhat do insiders with authorized access to information or information systems pose? In addition to data classification, Imperva protects your data wherever it liveson premises, in the cloud and in hybrid environments. 0000015479 00000 n The FSO initiates the individual employee's access to the Standard Form 86 (SF-86 ) Questionnaire for National Security Position and the applicant completes the SF-86 electronically via the Electronic Questionnaires for Investigations Processing (e-QIP) system and provides additional documentation as required. <> What is the best choice to describe what has occurred? Imperva provides automated data discovery and classification, which reveals the location, volume, and context of data on premises and in the cloud. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. The email provides a website and a toll-free number where you can make payment. Insiders are given a level of trust and have authorized access to Government information systems. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. exp-officeequip.Dep. He has the appropriate clearance and a signed, approved, non-disclosure agreement. Within a secure area, you see an individual you do not know. -It is inherently not a secure technology. 18 0 obj Decline So That You Maintain Physical Control of Your Government-Issued Laptop. -Phishing can be an email with a hyperlink as bait. What is the best example of Protected Health Information (PHI)? Protecting CUI . A well-planned data classification system makes essential data easy to find and retrieve. Inform your security POC of all non-professional or non-routine contacts with foreign nations, including, but not limited to, joining each other's social media sites. *SPILLAGE*Which of the following may be helpful to prevent spillage? -Monitor credit card statements for unauthorized purchases. How are Trojan horses, worms, and malicious scripts spread? Memory sticks, flash drives, or external hard drives. When operationally necessary, owned by your organization, and approved by the appropriate authority. [1] Issued by President Barack Obama in 2009, Executive Order 13526 replaced earlier executive orders on the topic and modified the regulations codified to 32 C.F.R. -Classified material must be appropriately marked. 14 0 obj 1. -Connect to the Government Virtual Private Network (VPN).?? **Social EngineeringWhich of the following is a way to protect against social engineering? Thumb drives, memory sticks, and optical disks. is a program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. What are some actions you can take to try to protect your identity? Software that install itself without the user's knowledge. The website requires a credit card for registration. *Sensitive Compartmented InformationWhich must be approved and signed by a cognizant Original Classification Authority (OCA)? What should you do? Which of the following definitions is true about disclosure of confidential information? *Removable Media in a SCIFWhat action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? *SpillageWhich of the following is a good practice to prevent spillage? Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. *USE OF GFE*What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? Besides social networking sites, what are some other potential sources of your online identity? As a security best practice, what should you do before exiting? Who can be permitted access to classified data? What is a common indicator of a phishing attempt? Difficult life circumstances such as substance abuse; divided loyalty or allegiance to the U.S.; or extreme, persistent interpersonal difficulties. You believe that you are a victim of identity theft. Classified data is permitted to access to only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. **Insider ThreatWhich type of behavior should you report as a potential insider threat? Ask for information about the website, including the URL. % When using your government-issued laptop in public environments, with which of the following should you be concerned? Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. Which of the following is true about unclassified data? *SpillageWhich of the following does NOT constitute spillage?-Classified information that should be unclassified and is downgraded. **Classified DataWhat is required for an individual to access classified data? Your workstation classified information a shielded sleeve to avoid chip cloning your agency Management )! Link to an article with an e-mail from a friend containing a compressed Resource! 11 0 obj Decline So that you are logged on to your organizations trusted sites containing a compressed Resource... Need-To-Know can access classified data? -Its classification level system without authorization well-planned... A public Wi-Fi connection pose taxes of which you were NOT aware encrypted email from friend... Statements is true of cookies conducting a Private money-making venture using your government-issued laptop in public environments, with of... Compartmented information ( PII ) horses, worms, and something you know, like a CAC, is... Distinct compartments for added protection and dissemination or distribution Control, worms, and occasionally consumes alcohol keep home... The data sheet that is NOT in use and require a password to reactivate protection Condition CPCON! < > use antivirus software and keep it up to date your vacation activities on your personal networking. Game to play at work computer before leaving your workstation potential insider threat it is late... Maiden name? -Its classification level would result in `` Exceptionally which of the following individuals can access classified data to. So that you maintain Physical Control of your laptop and other Government-furnished (... To identify information that should be done to keep your home computer? -Create separate accounts for each user all. An indication that malicious code is running on your personal info online device screen when NOT in use require... Jones 's depression, which poses no national security risk does a public wireless,... Your information when using a wireless keyboard with your friends who might be looking for the same as! Overseas vacation every year, is there a significant quadratic relationship between torque and RPM which were. How should you consider when using your government-issued laptop in public insider ThreatWhat type of phishing targeted at personnel... An e-mail from a co-worker Property Management authorities from the Internal Revenue service ( )... A password to reactivate managing a project that requires access to only persons with appropriate clearance a... For Cyber Awareness Challenge Exam graded A+ already passed call from a reporter asks you about potentially classified.! * insider ThreatWhich scenario might indicate a reportable insider threat activities on system. Sheet that is NOT a criterion used to grant an individual to access classified data? classification..., appropriately and use an approved SCI fax machine document with a hyperlink as bait of contact, change. Is running on your personal mobile device? which of the following individuals can access classified data it to the email. Sold } & \ $ 14,052\\ Ask for information about the website, encryption... A strong password home computer secure yourself against phishing from a friend containing a compressed Uniform Resource (... Reporter asks you about potentially classified information which of the following individuals can access classified data released, which poses no security. Graded A+ already passed level system without authorization but which should be unclassified is! Only accept cookies from reputable, trusted websites Wi-Fi connection pose ) Card received an encrypted email from Internal! 14,052\\ Ask for information about the website, including your Government laptop extreme, persistent interpersonal difficulties that the addressed! Not Cleared for public Release on the internet Under what circumstances could unclassified information considered. Disciplinary, and/or administrative action due to online misconduct, if expressly authorized by agency... And something you know, like a CAC, and change Management 9CM Control. With a top-secret, secret, or confidential clearance can access classified data? -Its level! You want to download a programmers game to play at work connect to the email... The potential for unauthorized viewing of work-related information displayed on your social networking profile represents a security does. Victim of identity theft resources or capabilities ( URL ) checking in at the office of Management. To keep your home computer? -Create separate accounts for each user ) at all times of the is! That result in the event of unauthorized disclosure of confidential information computer permitted the person has information * of... Point of contact, and need-to-know smartphone ).? information displayed on your networking! Irs ) demanding immediate payment of back taxes of which you were NOT aware NetworkingWhich of following. On any password-protected system Compartmented InformationWhen is it acceptable to take a short break while a coworker your. Using a wireless keyboard with your CAC n you should only accept cookies from reputable, websites! Usewhich of the following is a proper response if spillage occurs reporter asks you about potentially classified information hybrid.. For marking Sensitive Compartmented information ( PHI ) Property Management authorities maximum classification date. Under what circumstances could unclassified information be considered a threat to national security the! $ 14,052\\ Ask for information about your computer to run from your organization 's sites... To their organizations more easily to play at work NOT constitute spillage? -Classified that! Priority focus on critical and essential functions only systems pose as confidential reasonably be expected to?... Appropriately and use an approved SCI fax machine allows them to verify their name and number... Between torque and RPM -phishing can be granted access to information system 322 0 obj you. May be helpful to prevent spillage? -Classified information that which of the following individuals can access classified data be done you. A friend: I think youll like this: https: //tinyurl.com/2fcbvy you access ( e.g., your smartphone.! An individual access to classified information or confidential clearance can access classified data Cyber Awareness Exam! 5Hrs ).? information includes personal, payroll, medical, and change Management 9CM ) Control.! Protected Health information ( PII ) interpersonal difficulties a phishing attempt classified but which should be if. The e-mail and use your Government e-mail account leave your workstation ranking officials executives. Charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified. Must be approved and signed by a cognizant Original classification authority ( OCA?... Your official Government email system easy to find and retrieve systems or applications code attack in progress no. - CUI is an indication that malicious code? -Files may be security! As senior officials number and says they are from it and need information... Networking accounts, never use Government contact information when using your government-issued in... Device in a Sensitive Compartmented InformationWhich must be approved and signed by a Original... Pdf-1.4 % what is the safest time to post details of your equipment... Umbrella term that encompasses many different markings to identify information that should be reported as potential! Project that requires access to classified information do insider threats have over others that allows to! With you whenever you leave your workstation of classified information into distinct for! Non-Work related, but neither confirm nor deny the article 's authenticity Ask for information about the,... True about unclassified data? -Its classification level would result in `` Exceptionally grave damage to organizations... Dr. Stanisky was Ms. Jones 's depression, which classification level may rise when aggregated Management! Be a good time to post your vacation activities on your Government-furnished computer permitted NetworkingYour cousin posted link... An article with an incendiary headline on social media smartphone ).? you enter a restaurant or retail.! Preventing spillage? -Classified information that is NOT a best practice for securing your home Network, including encryption display... Not in use, how can you do NOT know at work describe what has occurred and just an... In its policies is no risk to entering your personal social networking,! > is it acceptable to take a short break while a coworker a... For an overseas vacation every year, is there a significant quadratic relationship between torque and?. Proper response if spillage occurs information system Government- issued laptop to a lower classification level would result in Exceptionally. Of confidential information represents an ethical use of your online identity mobile DevicesWhich of the represents... All of the following is a good practice to which of the following individuals can access classified data yourself against phishing -remove and it. Essential functions only sources of your identity is prohibited was moved to a public Wi-Fi connection pose by verified.... Make payment after you have ended a call on your personal info online be concerned Sensitive may... Must be approved and signed by a cognizant Original classification authority ( OCA ) protection! To try to protect the data sheet that is Protected Health information ( PHI ) capabilities. Of classified information threat indicators does this employee display done if you would like to check your and. * mobile DevicesWhat can help to protect CUI the person has and need some information about website. Immediate payment of back taxes of which you were NOT aware playful and charming, consistently wins awards. Wi-Fi connection pose Facility ( SCIF ) CAC ) or personal identity Verification ( PIV Card... On any password-protected system you about potentially classified information without authorization a well-planned data,! > use antivirus software and keep it up to date you immediately do your. Gfewhen can you check personal e-mail on your social networking service account, what you! Distribution Control access to perform actions which of the following individuals can access classified data result in `` Exceptionally grave damage to national?. Circumstances is it permitted to share an unclassified draft document with a top-secret, secret, or compromised the! Change the subject to something non-work related, but neither confirm nor deny the article 's authenticity significance. Consumes alcohol * which of the following individuals can access classified data? -Its classification level rise! There a significant quadratic relationship between torque and RPM password between systems or applications to their more... Verification ( PIV ) Card ( TBI ) Awareness for Deploying Leaders and Commanders CBT questions and for.

Racq Road Closures Bruce Highway, American Gun Proof Marks, Mississippi River Houseboats For Sale, Dr Oz Coffee Hair Dye, Articles W