Your favorite movie. Under what circumstances could unclassified information be considered a threat to national security? Contact the IRS using their publicly available, official contact information. Which may be a security issue with compressed urls? Which of the following should you NOT do if you find classified information on the internet? There is no way to know where the link actually leads. CUI is government created or owned information that requires safeguarding or dissemination controls consistent with applicable laws, regulations and government wide policies. Badges must be visible and displayed above the waist at all times when in the facility. Information improperly moved from a higher protection level to a lower protection level. *Sensitive Compartmented Information What is Sensitive Compartmented Information (SCI)? **Social Networking When is the safest time to post details of your vacation activities on your social networking profile? How many potential insider threat indicators does this employee display? b. Confirm the individuals need-to-know and access. Do not download it. Which is a risk associated with removable media? Which of the following should be reported as a potential security incident (in accordance with your Agencys insider threat policy)? Directives issued by the Director of National Intelligence. **Classified Data How should you protect a printed classified document when it is not in use? **Classified Data Which of the following is true of protecting classified data? Which of the following is true of Unclassified Information? b. taking away a toy or treat Exceptionally grave damage. We thoroughly check each answer to a question to provide you with the most correct answers. Keep your operating system and software up to date: This will help patch any security vulnerabilities in your software. Only use Government-furnished or Government-approved equipment to process PII. Ctrl+F (Cmd+F) will help you a lot when searching through such a large set of questions. How many potential insider threat indicators does this employee display? *Sensitive Compartmented Information When faxing Sensitive Compartmented Information (SCI), what actions should you take? You must have your organizations permission to telework. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Which of the following is a concern when using your Government-issued laptop in public? What should you do? Memory sticks, flash drives, or external hard drives. **Social Engineering Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? New answers. A coworker brings a personal electronic device into prohibited areas. Correct. **Insider Threat Which of the following is NOT considered a potential insider threat indicator? Looking at your MOTHER, and screaming THERE SHE BLOWS! Which of the following is NOT true concerning a computer labeled SECRET? Search the Registry: Categories, Markings and Controls: Category list CUI markings Unclassified information cleared for public release. CUI may be stored only on authorized systems or approved devices. **Social Networking Which of the following is a security best practice when using social networking sites? How many potential insiders threat indicators does this employee display. A type of phishing targeted at senior officials. Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? Which of the following is not considered an example of data hiding? Approved Security Classification Guide (SCG). *Sensitive Information Which of the following is an example of Protected Health Information (PHI)? You must have your organization's permission to telework c. You may use unauthorized software as long as your computer's antivirus software is up to date. What should you do? Report the crime to local law enforcement. Ensure there are no identifiable landmarks visible in any photos taken in a work setting that you post. Controlled Unclassified Information (CUI) is information that requires safeguarding or dissemination controls consistent with applicable laws, regulations, and Government-wide policies, but is not classified under Executive Order 13526 "Classified National Security Informat What are examples of CUI? Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Someone calls from an unknown number and says they are from IT and need some information about your computer. Which of the following is NOT an appropriate way to protect against inadvertent spillage? T/F. be wary of suspicious e-mails that use your name and/or appear to come from inside your organization. Unclassified documents do not need to be marked as a SCIF. Do not use any personally owned/non-organizational removable media on your organizations systems. Which of the following represents a good physical security practice? Tell us about it through the REPORT button at the bottom of the page. ! (A type of phishing targeted at senior officials) Which is still your FAT A$$ MOTHER! They can be part of a distributed denial-of-service (DDoS) attack. Insiders are given a level of trust and have authorized access to Government information systems. Linda encrypts all of the sensitive data on her government issued mobile devices. Unknown data is categorized by the system; an analyst then reviews the results Mark SCI documents appropriately and use an approved SCI fax machine. Set hasDigit to true if the 3-character passCode contains a digit, Critical, Essential, and Support Functions. Linda encrypts all of the sensitive data on her government-issued mobile devices. Download the information. Which of the following does NOT constitute spillage? Unclassified information can become a threat to national security. Law Enforcement Sensitive (LES),and others. What is the basis for the handling and storage of classified data? **Social Engineering How can you protect yourself from internet hoaxes? Retrieve classified documents promptly from printers. Which of the following should you do immediately? (social networking) Which of the following is a security best practice when using social networking sites? Discuss why gases, such as barbecue propane gas, are sold by mass and not by volume. All to Friends Only. Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Select the information on the data sheet that is protected health information (PHI). Antihistamines are used to treat the symptoms, such as sneezing, that are due to inflammation caused by irritants in the airways. correct. Which of the following is true of Controlled Unclassified information (CUI)? Store it in a locked desk drawer after working hours. Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIV) card. The website requires a credit card for registration. 5. THIS IS THE BEST ANSWER . How can you protect your organization on social networking sites? It does not require markings or distribution controls. *Sensitive Information What is the best example of Personally Identifiable Information (PII)? Some examplesyou may be familiar with: TheFederalCUI Registry,shows authorized categoriesandassociated markings, as well as applicable safeguarding, dissemination, and decontrol procedures. A coworker has left an unknown CD on your desk. The physical security of the device. You are working at your unclassified system and receive an email from a coworker containing a classified attachment. Controlled Unclassified Information (CUI) is information that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations, and government-wide policies but is not classified under Executive Order 13526 or the Atomic Energy Act, as amended. 10-3 X-ray Interaction with Matter, Fundamentals of Engineering Economic Analysis, David Besanko, Mark Shanley, Scott Schaefer. correct. Which Of The Following Is Not A Correct Way To Protect CUI. (Answer) CPCON 2 (High: Critical and Essential Functions) CPCON 1 (Very High: Critical Functions) CPCON 3 (Medium: Critical, Essential, and Support Functions) CPCON 4 (Low: All Functions) CPCON 5 (Very Low: All Functions). **Mobile Devices Which of the following helps protect data on your personal mobile devices? A lock (LockA locked padlock) or https:// means youve safely connected to the .gov website. Ive tried all the answers and it still tells me off. You receive an inquiry from a reporter about potentially classified information on the internet. **Classified Data What is a good practice to protect classified information? A program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. For programmatic questions regarding Controlled Unclassified Information (CUI), including any challenges to CUI marked by EPA, pleasecontact EPA's CUI Program Office. (Spillage) Which of the following is a good practice to aid in preventing spillage? Reviewing and configuring the available security features, including encryption. Which of the following includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. At all times while in the facility. Leaked classified or controlled information is still classified/controlled even if it has already been compromised. Which is a good practice to protect classified information? Use only your personal contact information when establishing your account. On a NIPRNet system while using it for a PKI-required task, Something you possess, like a CAC, and something you know, like a PIN or password. Information should be secured in a cabinet or container while not in use. Discrete data involves whole numbers (integers - like 1, 356, or 9) that can't be divided based on the nature of what they are. not correct asked in Internet by voice (265k points) internet. Spillage because classified data was moved to a lower classification level system without authorization. **Use of GFE When can you check personal e-mail on your Government-furnished equipment (GFE)? Which of the following is NOT a criterion used to grant an individual access to classified data? Government-owned PEDs, if expressly authorized by your agency. *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Prudence faxes CUI using an Unclassified cover sheet via a Secret fax machine. -Classified information that should be unclassified and is downgraded. f. Get an answer. A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. As a best practice, labeling all classified removable media and considering all unlabeled removable media as unclassified. Digitally signed e-mails are more secure. **Classified Data Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? Which of the following is true of telework? What should you do? Which of the following is not a best practice to preserve the authenticity of your identity? Before long she has also purchased shoes from several other websites. **Travel What is a best practice while traveling with mobile computing devices? 1).Compared with CK, straw addition treatments (S and SG) significantly (P < 0.01) increased the emission rate and cumulative emission of CO 2 and the cumulative CO 2 . In addition to offering an overview of cybersecurity best practices, the challenge also provides awareness of potential and common cyber threats. Your comments are due on Monday. What should be your response? Only allow mobile code to run from your organization or your organizations trusted sites. Which is NOT a method of protecting classified data? You must have permission from your organization. View email in plain text and dont view email in Preview Pane. It is created or received by a healthcare provider, health plan, or employer. Which is a way to protect against phishing attacks? All of these. Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. (Home computer) Which of the following is best practice for securing your home computer? When traveling or working away from your main location, what steps should you take to protect your devices and data? cyber. Hostility or anger toward the United States and its policies. Classified Information can only be accessed by individuals with. Store your Common Access Card (CAC) or Personal Identity Verification (PIV) card in a shielded sleeve ~Write your password down on a device that only you access (e.g., your smartphone) Change your password at least every 3 months Enable two-factor authentication whenever available, even for personal accounts. What should you do if a reporter asks you about potentially classified information on the web? Everything you need to know aboutControlled UnclassifiedInformation(CUI).