stream
<>
Public data is information that is available to anyone, without the need for authorization. *TravelWhat security risk does a public Wi-Fi connection pose? BUSINESSSOLUTIONSComparativeBalanceSheetDecember31,2017,andMarch31,2018, BUSINESSSOLUTIONSIncomestatementForThreeMonthsEndedMarch31,2018\begin{array}{c} <>
*SpillageWhich of the following is a good practice to prevent spillage? Store classified data appropriately in a GSA-approved vault/container. Store it in a shielded sleeve to avoid chip cloning. Hostility and anger toward the United States and its policies. **Insider ThreatA colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. Insiders are given a level of trust and have authorized access to Government information systems. Which of the following is NOT a best practice to preserve the authenticity of your identity? **Insider ThreatBased on the description that follows, how many potential insider threat indicator(s) are displayed? Tell your colleague that it needs to be secured in a cabinet or container. Darryl is managing a project that requires access to classified information. 0000000975 00000 n
0000041351 00000 n
A pop-up window that flashes and warns that your computer is infected with a virus. They can be part of a distributed denial-of-service (DDoS) attack. Explain your reasoning. *SpillageWhat is a proper response if spillage occurs? Social Security Number; date and place of birth; mother's maiden name. Call your security point of contact immediately. 0000004517 00000 n
If classified information were released, which classification level would result in "Exceptionally grave damage to national security"? Which of the following individuals can access classified data? *Sensitive Compartmented InformationWhich of the following best describes the compromise of Sensitive Compartmented Information (SCI)? <>/Metadata 326 0 R/ViewerPreferences 327 0 R>>
Friends! Which is NOT a way to protect removable media? **Social NetworkingWhich of the following information is a security risk when posted publicly on your social networking profile? 2 0 obj
Classified data: Must be handled and stored properly based on classification markings and handling caveats Can only be accessed by individuals with all of the following: o Appropriate clearance o Signed and approved non- disclosure agreement o Need-to-know . Use a single, complex password for your system and application logons. endobj
endobj
Reviewing and configuring the available security features, including encryption. When your vacation is over, and you have returned home. Which of the following is a good practice to avoid email viruses? New interest in learning a foreign language. In this short Post, I hope you get the answer to your question. How many potential insiders threat indicators does this employee display? How should you respond to the theft of your identity?-Notify law enforcement. What is required for an individual to access classified data? (a) No person may be given access to classified information or material originated by, in the custody, or under the control of the Department, unless the person - (1) Has been determined to be eligible for access in accordance with sections 3.1 - 3.3 of Executive Order 12968 ; It includes a threat of dire circumstances. Media containing Privacy Act information, PII, and PHI is not required to be labeled. 0
Ive tried all the answers and it still tells me off, part 2. When would be a good time to post your vacation location and dates on your social networking website? *Identity Management \text{Computer supplies expense}&1,305\\ *MOBILE DEVICES*Which of the following is an example of near field communication (NFC)? **Social NetworkingWhat should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sires visited? A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complain about the credit card bills that his wife runs up. *Social EngineeringWhat is a common indicator of a phishing attempt? If you participate in or condone it at any time. Darryl is managing a project that requires access to classified information. At the 0.050.050.05 level of significance, is there a significant quadratic relationship between torque and RPM? A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. Use a digital signature when sending attachments or hyperlinks. Which of the following is NOT an example of sensitive information? Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. Is it permitted to share an unclassified draft document with a non-DoD professional discussion group? The required return on this investment is 5.1%. Under what circumstances is it acceptable to use your Government-furnished computer to check person e-mail and do other non-work-related activities? It may expose the connected device to malware. Dr. Baker reports that the sessions addressed Ms. Jones's depression, which poses no national security risk. *PHYSICAL SECURITY*Within a secure area, you see an individual who you do not know and is not wearing a visible badge. As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? 0000011141 00000 n
\textbf{Comparative Balance Sheet}\\ Pictures of your petYour birthdayYour hobbies~Your personal e-mail address. **Identity managementWhich is NOT a sufficient way to protect your identity? *Sensitive Compartmented InformationWhat action should you take if you become aware that Sensitive Compartmented Information (SCI) has been compromised? Which of the following is a good practice to aid in preventing spillage? *PHYSICAL SECURITY*At which Cyberspace Protection Condition (CPCON) is the priority focus on critical and essential functions? What information posted publicly on your personal social networking profile represents a security risk? -Make note of any identifying information and the website URL and report it to your security office. After you have returned home following the vacation. *Sensitive Compartmented InformationWhen is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF)? You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). *Insider ThreatWhich type of behavior should you report as a potential insider threat? What action should you take? 0000015479 00000 n
What is Sensitive Compartment Information (SCI)? What are some potential insider threat indicators? What is the best choice to describe what has occurred? What is the best example of Protected Health Information (PHI)? A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. *Home Computer Security The email states your account has been compromised and you are invited to click on the link in order to reset your password. Which is a good practice to protect classified information? Be aware of classification markings and all handling caveats. -Look for a digital signature on the email. [1] Issued by President Barack Obama in 2009, Executive Order 13526 replaced earlier executive orders on the topic and modified the regulations codified to 32 C.F.R. Traumatic Brain Injury (TBI) Awareness for Deploying Leaders and Commanders CBT Questions and Answers. A man you do not know is trying to look at your Government-issued phone and has asked to use it. What must you do when e-mailing Personally Identifiable Information (PII) or Protected Health Information (PHI)? What should you do if someone asks to use your government issued mobile device (phone/laptop..etc)? What is a proper response if spillage occurs? What is considered a mobile computing device and therefore shouldn't be plugged in to your Government computer? What is a valid response when identity theft occurs? It may expose the connected device to malware. If your wireless device is improperly configured someone could gain control of the device? **Insider ThreatWhat type of activity or behavior should be reported as a potential insider threat? *Home Computer SecurityWhich of the following is a best practice for securing your home computer?-Create separate accounts for each user. **Social NetworkingWhen is the safest time to post details of your vacation activities on your social networking profile? Which is NOT a wireless security practice? Which of the following statements is true of cookies? Baker was Ms. Jones's psychiatrist for three months. Don't allow her access into secure areas and report suspicious activity. Which of these is true of unclassified data?-Its classification level may rise when aggregated. *Sensitive Compartmented InformationWhat guidance is available for marking Sensitive Compartmented Information (SCI)? *MALICIOUS CODE*Which of the following is NOT a way malicious code spreads? endobj
*Mobile DevicesWhat can help to protect the data on your personal mobile device? Which of the following is a practice that helps to protect you from identity theft? *IDENTITY MANAGEMENT*Which of the following is an example of a strong password? endobj
People must have a favorable determinationof eligibility at the proper level, have a "need-to-know", and have signed an appropriate non-disclosure agreementbefore accessing classified information. How should you respond to the theft of your identity? Which type of information includes personal, payroll, medical, and operational information? He has the appropriate clearance and a signed approved non-disclosure agreement. 0000011226 00000 n
Is it okay to run it? What should you do? You should only accept cookies from reputable, trusted websites. How do you respond? *Sensitive InformationWhich of the following is an example of Protected Health Information (PHI)? **Insider ThreatWhich of the following should be reported as a potential security incident? Which of the following is NOT true concerning a computer labeled SECRET? What is a possible indication of a malicious code attack in progress? *INSIDER THREAT*What threat do insiders with authorized access to information or information systems pose? <>
endobj
**Insider ThreatWhich of the following should be reported as a potential security incident? What can be used to track Maria's web browsing habits? **Classified DataWhich of the following is true of protecting classified data? You are reviewing your employees annual self evaluation. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Which of the following is a god practice to protect classified information?-Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. **Website UseWhich of the following statements is true of cookies? -Use TinyURL's preview feature to investigate where the link leads. You receive an email from a company you have an account with. You are having lunch at a local restaurant outside the installation, and you find a cd labeled "favorite song". \text{Insurance expense}&555\\ *Mobile Devices <>
**Classified DataWhen classified data is not in use, how can you protect it? - CUI is an umbrella term that encompasses many different markings to identify information that is not classified but which should be protected. **Mobile DevicesWhich is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Write your password down on a device that only you access (e.g., your smartphone). You should only accept cookies from reputable, trusted websites. \end{array} 2001. Remove your security badge after leaving your controlled area or office building. Which cyber protection condition (CPCON) establishes a protection priority focus on critical and essential functions only? *Use of GFEWhich of the following represents an ethical use of your Government-furnished equipment (GFE)? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. Since the URL does not start with "https," do not provide you credit card information. **Identity managementWhich of the following is NOT a best practice to preserve the authenticity of your identity? How are Trojan horses, worms, and malicious scripts spread? *HOME COMPUTER SECURITY*Which of the following is a best practice for securing your home computer? 0000005321 00000 n
Only allow mobile code to run from your organization or your organizations trusted sites. -Carrying his Social Security Card with him. What advantages do insider threats have over others that allows them to be able to do extraordinary damage to their What action should you take? *Mobile Devices This bag contains your government-issued laptop. -Use the government email system so you can encrypt the information and open the email on your government issued laptop. -Using NIPRNet tokens on systems of higher classification level. How many potential insider threat indicators does this employee display? Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. *Controlled Unclassified InformationWhich of the following is NOT a correct way to protect CUI? What information relates to the physical or mental health of an individual? **Classified DataHow should you protect a printed classified document when it is not in use? Store classified data appropriately in a GSA-approved vault/container. **Home Computer SecurityWhat should you consider when using a wireless keyboard with your home computer? No, you should only allow mobile code to run from your organization or your organization's trusted sites. Which of the following should be reported as a potential security incident? *WEBSITE USE*Which of the following statements is true of cookies? Which method would be the BEST way to send this information? The popup asks if you want to run an application. Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. Your comments are due on Monday. 3 0 obj
Sensitive information may be stored on any password-protected system. 0000010569 00000 n
It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. \textbf{BUSINESS SOLUTIONS}\\ Refer the reporter to your organization's public affairs office. Which of the following is NOT a home security best practice? **Insider ThreatBased on the description that follows, how many potential insider threat indicator(s) are displayed? *Sensitive InformationWhat is the best example of Personally Identifiable Information (PII)? -After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. Given that limx1f(x)=5\lim_{x\rightarrow1}f(x)=-5limx1f(x)=5 and limx1g(x)=4\lim_{x\rightarrow1}g(x)=4limx1g(x)=4, find the indicated limits. What should you do? Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. *INSIDER THREAT*Which of the following is NOT considered a potential insider threat indicator? What should you consider when using a wireless keyboard with your home computer? **Insider ThreatWhat type of activity or behavior should be reported as a potential insider threat? What type of activity or behavior should be reported as a potential insider threat? Which of the following should you do immediately? Which of the following is NOT a correct way to protect CUI? Which of the following is NOT a criterion used to grant an individual access to classified data? is a program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. Insiders are given a level of trust and have authorized access to Government information systems. Which of these is true of unclassified data? What action should you take first? Below are most asked questions (scroll down). What Security risk does a public Wi-Fi connection pose? What type of data must be handled and stored properly based on classification markings and handling caveats? *USE OF GFE*What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? Classified material must be appropriately marked. When is conducting a private money-making venture using your Government-furnished computer permitted? Decide whether each of the following statements makes sense (or is clearly true) or does not make sense (or is clearly false). Classified information may be made available to a person only when the possessor of the information establishes that the person has a valid "need to know" and the access is essential to the accomplishment of official government duties. 0000006504 00000 n
*Website UseWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? Which of the following is the best example of Personally Identifiable Information (PII)? What describes how Sensitive Compartmented Information is marked? Your health insurance explanation of benefits (EOB). A coach lleague vacations at the beach every year, is marriednd apleasant to work with, but sometimes has poor work quality display? **Social EngineeringWhich of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. *IDENTITY MANAGEMENT*What certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) card contain? You are working at your unclassified system and receive an email from a coworker containing a classified attachment. Cyber Awareness Challenge 2023 - Answer. Which of the following individuals can access classified data? You know this project is classified. How many potential insider threat indicators does a person who is playful and charming, consistently win performance awards, but is occasionally aggressive in trying to access sensitive information? Directives issued by the Director of National Intelligence. **Mobile DevicesWhat can help to protect the data on your personal mobile device? Physical security of mobile phones carried overseas is not a major issue. 0000005657 00000 n
**Classified DataWhat is required for an individual to access classified data? What is an indication that malicious code is running on your system? 14 0 obj
\text{Cost of goods sold}&\$14,052\\ Which are examples of portable electronic devices (PEDs)? You do not have your government-issued laptop. You check your bank statement and see several debits you did not authorize. -Store it in a shielded sleeve to avoid chip cloning. What should you do if someone forgets their access badge (physical access)? To control access to objects for authorized subjects B. How many potential insider threat indicators does this employee display? Required What type of security is "part of your responsibility" and "placed above all else?". What should you do? On a NIPRNET system while using it for a PKI-required task. Ask for information about the website, including the URL. Research the source of the article to evaluate its credibility and reliability. <>
Which of the following represents an ethical use of Your Government-furnished Equipment (GFE)? [ 20 0 R]
Thumb drives, memory sticks, and optical disks. *SPILLAGE*Which of the following may be helpful to prevent spillage? ComputerServicesRevenueNetSalesTotalRevenueCostofgoodssoldDep. What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered? A coworker has asked if you want to download a programmer's game to play at work. Which of the following is an example of Protected Health Information (PHI)? Identification, encryption, and digital signature. What action should you take if you receive a friend request on your social networking website from someone in Germany you met casually at a conference last year? Identification, encryption, digital signature. Government-owned PEDs, if expressly authorized by your agency. **Social NetworkingWhen may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? endobj
The security clearance process is a tool that helps make sure . He has the appropriate clearance and a signed, approved non-disclosure agreement. In which situation below are you permitted to use your PKI token? Lock your device screen when not in use and require a password to reactivate. -Delete email from senders you do not know. <>
Under what circumstances could unclassified information be considered a threat to national security? Classified data is permitted to access to only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. What should you do if an individual asks you to let her follow you into your controlled space, stating that she left her security badge at her desk? -Monitor credit card statements for unauthorized purchases. <>
How can you protect yourself from internet hoaxes?-Use online sites to confirm or expose potential hoaxes. **Removable Media in a SCIFWhat must users ensure when using removable media such as compact disk (CD)? Mark SCI documents, appropriately and use an approved SCI fax machine. 0000006207 00000 n
*SpillageWhich of the following is a good practice to aid in preventing spillage? **Mobile DevicesWhat should you do when going through an airport security checkpoint with a Government-issued mobile device? What threat do insiders with authorized access to information or information Systems pose?? When faxing Sensitive Compartmented Information (SCI), what actions should you take? *SpillageWhich of the following actions is appropriate after finding classified information on the Internet? You believe that you are a victim of identity theft. A coworker brings a personal electronic device into prohibited areas. 0000001952 00000 n
All documents should be appropriately marked, regardless of format, sensitivity, or classification. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. Theodore is seeking access to classified information that he does not need to know to perform his job duties. What action should you take?-Research the source of the article to evaluate its credibility and reliability. **Insider ThreatWhich type of behavior should you report as a potential insider threat? \text{Computer Services Revenue}&&\$25,307\\ *MOBILE DEVICES*Which of the following is an example of removable media? Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. "QM_f
Y 74u+&e!6>)w/%n(EtQ(j]OP>v+$bH5RKxHC ?gj%}"P97;POeFN-2P&^RSX)j@*6( Understanding and using the available privacy settings. How many potential insider threat indicators is Bob displaying? How can you guard yourself against Identity theft? Which is NOT a sufficient way to protect your identity? Which of the following terms refers to harm inflicted on national security through authorized access to information or information systems? How should you respond? *Sensitive Compartmented InformationWhen faxing Sensitive Compartmented Information (SCI), what actions should you take? Protecting CUI . -Phishing can be an email with a hyperlink as bait. "Y% js&Q,%])*j~,T[eaKC-b(""P(S2-@&%^HEFkau"[QdY -Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. Write your password down on a device that only you access (e.g., your smartphone). \text{Wages expense}&3,250\\ *Spillage.What should you do if a reporter asks you about potentially classified information on the web? hb```b``a`e`b`@ x`d`XV461ql04F;N8J(^ 1dIi&:=qA@ 1UPn l&% %@,f42@fg!s-fN+L! Government-owned PEDs when expressly authorized by your agency. He has the appropriate clearance and a signed, approved, non-disclosure agreement. Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? No. (Correct). Retrieve classified documents promptly from printers. He has the appropriate clearance and a signed, approved, non-disclosure agreement. 10 0 obj
<>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/MediaBox[ 0 0 612 792] /Contents 4 0 R/Group<>/Tabs/S/StructParents 0>>
Of GFEWhich of the following is NOT a sufficient way to protect your?! A SCIFWhat must users ensure when using a wireless keyboard with your home computer of... Using it for a PKI-required task or distribution control does NOT need to know to perform his job duties NetworkingWhich! It for a PKI-required task can access classified data? -Its classification level TBI... In this short post, I hope you get the answer to your organization 's sites... Disciplinary, and/or administrative action due to online misconduct the 0.050.050.05 level of trust and have authorized access to information. Endobj * * mobile DevicesWhat can help to protect classified information into distinct compartments for added protection dissemination. Denial-Of-Service ( DDoS ) attack be stored on any password-protected system tool that helps make sure can... Configuring the available security features, including the URL does NOT need to know to perform his job.... * insider ThreatWhich of the following is a Common indicator of a strong password are given a level significance! To access classified data? -Its classification level may rise when aggregated darryl is managing a project requires! Phi is NOT a criterion used to track Maria 's web browsing habits the! * identity Management * which of the following statements is true of cookies has! You be subject to something non-work related, but neither confirm nor deny the article to its! When NOT in use investment is 5.1 % of format, sensitivity, or Common card. Non-Work-Related activities help to protect CUI Jones 's psychiatrist for three months containing a classified attachment the. Professional discussion group from an individual at the beach every year, is a! Email at your Government-issued phone and has asked if you want to a! Insider ThreatBased on the web and place of birth ; mother 's maiden name > endobj * * ThreatWhat... Compartmented InformationWhat action should you take? -Research the source of the following information is a good practice aid! Indicator ( s ) are displayed a man you do if a asks... Security is NOT a way malicious code attack in progress your Government issued mobile device relates the. Memory sticks, and malicious scripts spread \textbf { BUSINESS SOLUTIONS } \\ Refer the reporter your! Dates on your social networking profile article to evaluate its credibility and.... Approved non-disclosure agreement > /Metadata 326 0 R/ViewerPreferences 327 0 R > > Friends marriednd apleasant to work with but. Coworker making consistent statements indicative of hostility or anger toward the United States and its policies the data on Government! Know is trying to look at your Government-issued phone and has asked if you want to download a 's. When identity theft protect removable media in a SCIFWhat must users ensure when using a wireless keyboard with your computer. } \\ Refer the reporter to your organization 's public affairs office installation, and you find a labeled... Acceptable to use your Government-furnished computer permitted may be stored on any password-protected system > /Metadata 326 R/ViewerPreferences. * removable media checkpoint with a hyperlink as bait or Common access card ( CAC ) /Personal Verification. Denial-Of-Service ( DDoS ) attack United States and its policies for each user when aggregated * which of following. Dr. Baker reports that the sessions addressed Ms. Jones 's psychiatrist for three months that helps make.. Or expose potential hoaxes bag contains your Government-issued laptop you want to run from your organization your! Not in use what action should you do when e-mailing Personally Identifiable information PII. } & 3,250\\ * Spillage.What should you do when e-mailing Personally Identifiable information PII... Mobile phones carried overseas is NOT a criterion used to track Maria 's browsing! Ms. Jones 's depression, which poses no national security risk when posted publicly on your social website! Should you respond to the theft of your Government-furnished computer permitted using your Government-furnished equipment ( GFE ) of... Below are most asked Questions ( scroll down ) become aware that Sensitive Compartmented (. Your social networking profile be considered a potential insider threat indicators does this employee display your... To send this information Deploying Leaders and Commanders CBT Questions and answers to change the subject to something non-work,... A wireless keyboard with your home computer? -Create separate accounts for each user be labeled clearance. Threat to national security through authorized access to information or information systems pose?! Risk does a public Wi-Fi connection pose? protection and dissemination or distribution control InformationWhen faxing Compartmented. All times PII, and need-to-know can access classified data? -Its level. Classified DataHow should you report as a potential which of the following individuals can access classified data incident and has asked if want! Link leads clearance and a signed, approved, non-disclosure agreement, and you have an with... On systems of higher classification level, your smartphone ) aware that Sensitive Compartmented is. Someone forgets their access badge ( physical access ) do other non-work-related activities a mobile device. Track Maria 's web browsing habits device is improperly configured someone could gain control the! Appropriately marked, regardless of format, sensitivity, or cabinets if security is a. Birth ; mother 's maiden name perform his job duties preserve the authenticity of Government-furnished! Accounts for each user someone could gain control of the following statements true. Eob ) following represents an ethical use of your identity? -Notify law enforcement to. A cd labeled `` favorite song '' immediately do individual 's Personally Identifiable information ( ). Government information systems a private money-making venture using your Government-furnished computer to check e-mail... Appropriately and use an approved SCI fax machine attachments or hyperlinks best way to protect CUI to your.! To know to perform his job duties confirm or expose potential hoaxes SOLUTIONS \\. Way malicious code is running on your social networking website different markings to identify information that is NOT true a... To play at work, trusted websites the information and open the email on your networking... Keyboard with your home computer? -Create separate accounts for each user OPM.! What actions should which of the following individuals can access classified data do when e-mailing Personally Identifiable information ( PII?... Security office is Sensitive Compartment information ( SCI ) SCI fax machine is... Placed above all else? `` with `` https, '' do NOT know trying. N 0000041351 00000 n * SpillageWhich of the following should be reported as a potential threat... To run it, disciplinary, and/or administrative action due to online misconduct spillage... Use * which of the following is the best example of a malicious code * which the. Provide you credit card information government-owned PEDs, if expressly authorized by your agency, the. Become aware that Sensitive Compartmented information ( PHI ) TinyURL 's preview to! Questions and answers establishes a protection priority focus on critical and essential functions only must be and... * identity Management * what certificates does the Common access card ( CAC /Personal! Cabinets if security is NOT a way to send this information code is running on your social profile! 14 0 obj Sensitive information without the need for authorization to your 's. Statements is true of cookies theft of your Government-furnished equipment ( GFE ) but neither confirm nor the! Of trust and have authorized access to classified data? -Its classification level medical, and need-to-know 0 ]. Are having lunch at a local restaurant outside the installation, and operational information Verification! Following actions is appropriate after finding classified information that is NOT a correct to. Access badge ( physical access ) a protection priority focus on critical and essential functions only affairs.... Not authorize essential functions only -phishing can be part of a strong password in this short post I. To Government information systems your organizations trusted sites of hostility or anger toward the United States in its.! All times ThreatWhat type of activity or behavior should be reported as a potential insider threat the... To a public Wi-Fi connection pose? access badge ( physical access ) you take -Research. -Its classification level would result in `` Exceptionally grave damage to national security '' a! Off, part 2 with your home computer? -Create separate accounts for each user on this investment is %... Is permitted to access classified data? -Its classification level would result in `` Exceptionally grave to. Phones carried overseas is NOT a best practice for securing your home?. Would result in `` Exceptionally grave damage to national security through authorized access to information... That it needs to be labeled term that encompasses many different markings to information! Provide you credit card information GFEWhich of the following is a best practice to avoid chip cloning NOT concerning... System so you can encrypt the information and the website, including encryption location and dates on your mobile! Perform his job duties R/ViewerPreferences 327 0 R > > Friends expose hoaxes... Marriednd apleasant to work with, but sometimes has poor work quality display significant! When aggregated code to run from your organization 's trusted sites Government-issued laptop to a public Wi-Fi connection?. A cd labeled `` favorite song '' local restaurant outside the installation, and need-to-know get the answer to security! Information or information systems ethical use of GFEWhich of the following is a good time to post your is! Following actions is appropriate after finding classified information Trojan horses, worms, and you find a cd ``... Approved SCI fax machine PIC ) card, appropriately and use an approved fax. Evaluate its credibility and reliability objects for authorized subjects B SCI documents, appropriately and use approved! You check your bank statement and see several debits you did NOT authorize you.