A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. There are many travel tips for mobile computing. You can't have 1.9 children in a family (despite what the census might say ). CUI was established to standardize the way the Executive branch handles sensitive information that requires dissemination controls. (Malicious Code) What is a good practice to protect data on your home wireless systems? What Are Some Examples Of Malicious Code Cyber Awareness? Log in for more information. Unclassified documents do not need to be marked as a SCIF. f. Get an answer. Insiders are given a level of trust and have authorized access to Government information systems. Which of the following is NOT a correct way to protect sensitive information? What should you do if a reporter asks you about potentially classified information on the web? Based on the description that follows how many potential insider threat indicators are displayed? laptops, fitness bands, tablets, smartphones, electric readers, and Bluetooth devices. Note the websites URL and report the situation to your security point of contact. Telework is only authorized for unclassified and confidential information. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF. You receive an inquiry from a reporter about government information not cleared for public release. February 8, 2022. 1).Compared with CK, straw addition treatments (S and SG) significantly (P < 0.01) increased the emission rate and cumulative emission of CO 2 and the cumulative CO 2 . CPCON 3 (Medium: Critical, Essential, and Support Functions) They can be part of a distributed denial-of-service (DDoS) attack. (GFE) When can you check personal e-mail on your Government-furnished equipment (GFE)? 1.To provide opportunities for individuals and businesses to open checking accounts __________, To write rules and guidelines for financial institutions under its supervision __________, To be the lender of last resort for financial institutions __________, To conduct the nations monetary policy with the goals of maintaining full employment and price stability __________, 5. Using NIPRNet tokens on systems of higher classification level. Classified information that should be unclassified and is downgraded. What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)? What is required for an individual to access classified data? What should you do? (Spillage) What should you do when you are working on an unclassified system and receive an email with a classified attachment? It is not corporate intellectual property unless created for or included in requirements related to a government contract. (Sensitive Information) Which of the following is NOT an example of sensitive information? The website requires a credit card for registration. Dont allow other access or to piggyback into secure areas. What is a valid response when identity theft occurs? No. correct. You find information that you know to be classified on the Internet. When your vacation is over, and you have returned home. Which of the following is true of Unclassified information? Hostility or anger toward the United States and its policies. Cyber Awareness 2020 Knowledge Check Flashcards | Quizlet Thats the only way we can improve. Not correct Correct **Website Use How should you respond to the theft of your identity? Keep your operating system and software up to date: This will help patch any security vulnerabilities in your software. Which of the following is not considered an example of data hiding? *Sensitive Compartmented Information What should the owner of this printed SCI do differently? Create separate user accounts with strong individual passwords. A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. How can you protect yourself from social engineering? Only paper documents that are in open storage need to be marked. Hostility or anger toward the United States and its policies. You receive an email from a company you have an account with. Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information? What should be done to protect against insider threats? Alexa May, director of accounts, received a bill for $648\$648$648, dated April 666, with sales terms 2/10,1/15,n/302/10, 1/15, n/302/10,1/15,n/30. Found a mistake? Which of the following is NOT an appropriate way to protect against inadvertent spillage? Mark SCI documents appropriately and use an approved SCI fax machine. Unauthorized Disclosure of Classified Information and Controlled Unclassified Information . -Its classification level may rise when aggregated. Which of the following is NOT a security best practice when saving cookies to a hard drive? **Mobile Devices Which of the following helps protect data on your personal mobile devices? Unclassified Information Student Guide . **Mobile Devices Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Immediately notify your security point of contact. *Spillage What is a proper response if spillage occurs? Download the information. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Immediately notify your security point of contact. Which of the following is NOT a typical means for spreading malicious code? We recommend Norton Security or McAfee Total Protection. What amount is due if Alexa pays on or betwee n April 222222 and May 666? d. giving a spanking or a scolding. Which of the following is a good practice to protect classified information? *Classified Data Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. Briefly describe what you have learned. **Social Engineering Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? Ive tried all the answers and it still tells me off. Maintain visual or physical control of the device. I may decide not to consent to these terms, but, if I do not consent to all of these terms, then I agree not to proceed with creating an account or moving forward with filling out the application, and I understand that I will not be . What can help to protect the data on your personal mobile device. Everything you need to know aboutControlled UnclassifiedInformation(CUI). Which of the following attacks target high ranking officials and executives? Unsupervised machine learning: Dealing with unknown data Not correct Controlled unclassified information. classified-document. Store it in a General Services Administration (GSA)-approved vault or container. You have reached the office door to exit your controlled area. Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. Controlled Unclassified Information (CUI) is information that requires safeguarding or dissemination controls consistent with applicable laws, regulations, and Government-wide policies, but is not classified under Executive Order 13526 "Classified National Security Informat What are examples of CUI? After you have returned home following the vacation. (Malicious Code) While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. Refer the reporter to your organizations public affairs office. What action should you take? Log in for more information. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. Since the URL does not start with https, do not provide you credit card information. correct. Under What Circumstances Could Unclassified? Which of the following is an example of malicious code? Explain. Your health insurance explanation of benefits (EOB). Click the card to flip Flashcards Learn Test Match Created by Jamie_Lancaster Terms in this set (24) However, agency personnel and contractors should first consult their agency's CUI implementing policies and program management for guidance. the following is true about unclassified data fy23 controlled unclassified information cui quizlet what is true of controlled unclassified information What. John submits CUI to his organizations security office to transmit it on his behalf. The following table lists the number of drivers in the United States, the number of fatal accidents, and the number of total accidents in each age group in 2002. What action is recommended when somebody calls you to inquire about your work environment or specific account information? Prudence faxes CUI using an Unclassified cover sheet via a Secret fax machine. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? **Insider Threat What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? Refer the reporter to your organizations public affairs office. Executive Order 13556, Controlled Unclassified Information, requires the Executive Branch to establish an open and uniform program for managing [unclassified] information that requires safeguarding or dissemination controls pursuant to and consistent with laws, regulations, and Government-wide policies. The National Archives and Records Administration (NARA) was named the Executive Agent (EA) responsible for overseeing the CUI Program. Which of the following best describes wireless technology? which of the following is true about unclassified data - Weegy Government-owned PEDs when expressly authorized by your agency. **Removable Media in a SCIF What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? **Identity management Which is NOT a sufficient way to protect your identity? (Spillage) Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? (Malicious Code) A coworker has asked if you want to download a programmers game to play at work. Store it in a locked desk drawer after working hours. asked in Internet by voice (265k points) Question : Which of the following is true about unclassified data? What should be your response? The attributes of identified ground seeds are modified to ground points. Store it in a shielded sleeve to avoid chip cloning. **Classified Data Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? New answers. 1.1.1 Spillage. Based on the description that follows, how many potential insider threat indicator (s) are displayed? Antihistamines are used to treat the symptoms, such as sneezing, that are due to inflammation caused by irritants in the airways. How many potential insider threat indicators does this employee display? Which of following is true of protecting classified data? not correct Only documents that are classified Secret, Top Secret, or SCI require marking. Follow procedures for transferring data to and from outside agency and non-Government networks. Store classified data appropriately in a GSA-approved vault/container. Which of the following is an example of a strong password? what should you do? **Insider Threat Which type of behavior should you report as a potential insider threat? Your comments are due on Monday. asked in Internet by voice (265k points) internet. Use a common password for all your system and application logons. **Social Engineering Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? (social networking) When is the safest time to post details of your vacation activities on your social networking profile? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. Ask them to verify their name and office number. (Sensitive Information) What type of unclassified material should always be marked with a special handling caveat? Since the URL does not start with https, do not provide your credit card information. What should you do? Software that installs itself without the users knowledge. Back up your data: This will help you recover your data if it's lost or corrupted. Which of the following is true of Controlled Unclassified information (CUI)? See the discussed example before. Which of the following is NOT a typical result from running malicious code? Proactively identify potential threats and formulate holistic mitigation responses. Controlled Unclassified Information - Defense Counterintelligence and (Malicious Code) Which email attachments are generally SAFE to open? You receive an inquiry from a reporter about potentially classified information on the internet. Which of the following is NOT a criterion used to grant an individual access to classified data? Which designation marks information that does not have potential to damage national security? Under what circumstances could unclassified information be considered a threat to national security? Which of these is true of unclassified data? (Home computer) Which of the following is best practice for securing your home computer? *Spillage Which of the following may help prevent inadvertent spillage? Which of the following should you do immediately? Which of the following is true about telework? What should the participants in this conversation involving SCI do differently? What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? **Insider Threat Which of the following is NOT considered a potential insider threat indicator? Cyber Awareness Challenge 2023 Answers Quizzma Which of the following is true of the Common Access Card (CAC) or Personal Identity Verification (PIV) card? Which of the following is NOT a typical result from running malicious code? There are no choices provides which make it hard to pick the untrue statement about unclassified data. Verify the identity of all individuals.??? *Sensitive Information Under which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? In which situation below are you permitted to use your PKI token? *Sensitive Compartmented Information Which must be approved and signed by a cognizant Original Classification Authority (OCA)? How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? CUI includes, but is not limited to Controlled Technical Information (CTI), Personally Identifiable Information (PII), Protected Health Information (PHI), financial information, personal or payroll information, proprietary data and operational information. Organizational Policy Not correct A Common Access Card and Personal Identification Number. true-statement. Seeker - Vacancy - Detail Overview JavaScript appears to be disabled on this computer. Follow the steps enlisted below to use WEKA for identifying real values and nominal attributes in the dataset. Which of the following is NOT a requirement for telework? Its classification level may rise when aggregated. Which of the following is a practice that helps to protect you from identity theft? Correct. What describes how Sensitive Compartmented Information is marked? 5. -Ask them to verify their name and office number Her badge is not visible to you. Managing government information when working remotely Sensitive information. correct. (Spillage) What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? Law Enforcement Sensitive (LES),and others. (Correct) -It does not affect the safety of Government missions. As a security best practice, what should you do before exiting? (Malicious Code) Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? It is created or received by a healthcare provider, health plan, or employer. Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approves for access to the NIPRNET. 1.1 Standard Challenge Answers. Here you can find answers to the DoD Cyber Awareness Challenge. What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered? The physical security of the device. Use a single, complex password for your system and application logons. Lock your device screen when not in use and require a password to reactivate. Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. That trust is bounded by the Oath of Office we took willingly. Which of the following is true of Sensitive Compartmented Information (SCI)? A trusted friend in your social network posts a link to vaccine information on a website unknown to you. This lets the service person know when the tank is "full." Individuals must avoid referencing derivatively classified reports classified higher than the recipient.??? You must have your organization's permission to telework. not correct. (Sensitive Information) What should you do if a commercial entity, such as a hotel reception desk, asks to make a photocopy of your Common Access Card (CAC) for proof of Federal Government employment? How can you avoid downloading malicious code? A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complain about the credit card bills that his wife runs up. Note any identifying information and the websites Uniform Resource Locator (URL). ! (A type of phishing targeted at senior officials) Which is still your FAT A$$ MOTHER! THIS IS THE BEST ANSWER . Back To Business I.T. on LinkedIn: #mfa #2fa #multifactorauthentication *Spillage What should you do if a reporter asks you about potentially classified information on the web? How many insider threat indicators does Alex demonstrate? Which of the following is true of transmitting Sensitive Compartmented Information (SCI)? Which of the following includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? Which is an untrue statement about unclassified data? Memory sticks, flash drives, or external hard drives. Mark SCI documents appropriately and use an approved SCI fax machine. They can be part of a distributed denial-of-service (DDoS) attack. What actions should you take with a compressed Uniform Resource Locator (URL) on a website known to you? Rating. What is best practice while traveling with mobile computing devices? Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you. What are some potential insider threat indicators? (Sensitive Compartmented Information) What describes how Sensitive Compartmented Information is marked? This is information that, if released to the public, carries no injury to personal, industry, or government interests. A 3%3\%3% penalty is charged for payment after 303030 days. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. **Identity Management Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. Which of the following is a concern when using your Government-issued laptop in public? Keeping a database from being accessed by unauthorized visitors C. Restricting a subject at a lower classification level from accessing data at a higher classification level D. Preventing an . Executive Order 13526 Classified National Security Information, PersonallyIdentifiable Information (PII), Sensitive Personally Identifiable Information (SPII), Proprietary Business Information (PBI) or currently known within EPA as Confidential Business Information (CBI), Unclassified Controlled Technical Information (UCTI). Which of the following is true about unclassified data? - Getvoice.org Amendments to a variety of policy documents as well as others referencing Confidential Business Information (CBI) submissions or handling, Changes to paper and e-forms and instructions for their submission to EPA. (Malicious Code) What is a common indicator of a phishing attempt? *Insider Threat Which of the following is a reportable insider threat activity? After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. d. How do the size and shape of a human epithelial cell differ from those of the Elodea and onion cells that you examined earlier? **Classified Data How should you protect a printed classified document when it is not in use? What is the best response if you find classified government data on the internet?