*UNCONTROLLED CLASSIFIED INFORMATION*Which of the following is NOT an example of CUI? \text{Total expenses}&&\underline{~~~25,167}\\ 0000034293 00000 n
12 0 obj
Classified data is permitted to access to only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Use TinyURLs preview feature to investigate where the link leads. endobj
4. 0000003201 00000 n
DoD employees are prohibited from using a DoD CAC in card-reader-enabled public devices. *SpillageAfter reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. endobj
What action should you take? All documents should be appropriately marked, regardless of format, sensitivity, or classification. What should you do after you have ended a call from a reporter asking you to confirm potentially classified information found on the web? Approved Security Classification Guide (SCG). *Sensitive Compartmented InformationWhen is it appropriate to have your security badge visible? **Insider ThreatA colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. -Ask them to verify their name and office number. Why is a checking account sometimes called a demand deposit? }&400\\ What type of security is "part of your responsibility" and "placed above all else?". What type of unclassified material should always be marked with a special handling caveat? -Potential Insider Threat It is getting late on Friday. *Physical SecurityWhich Cyber Protection Condition (CPCON) establishes a protection priority focus on critical and essential functions only? 13 0 obj
People must have a favorable determinationof eligibility at the proper level, have a "need-to-know", and have signed an appropriate non-disclosure agreementbefore accessing classified information. What advantages do insider threats have over others that allows them to be able to do extraordinary damage to their *UNCONTROLLED CLASSIFIED INFORMATION*Which of the following is NOT a correct way to protect CUI? Which of the following is NOT true concerning a computer labeled SECRET? Which of the following is NOT considered a potential insider threat indicator? *SpillageWhich of the following does NOT constitute spillage?-Classified information that should be unclassified and is downgraded. What describes how Sensitive Compartmented Information is marked? 0
*SpillageAfter reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? What must you ensure before transmitting Personally Identifiable Information (PII) or Protected Health Information (PHI) via e-mail? Which of following is true of protecting classified data? \text{Dep. **Classified DataWhat level of damage can the unauthorized disclosure of information classified as Confidential reasonably be expected to cause? A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. 1312.23 Access to classified information. \text{Mileage expense}&320\\ A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. -Never allow sensitive data on non-Government-issued mobile devices. !LL"k)BSlC ^^Bd(^e2k@8alAYCz2QHcts:R+w1F"{V0.UM^2$ITy?cXFdMx Y8> GCL!$7~Bq|J\> V2 Y=n.h! Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? Which of the following should be reported as a potential security incident? endstream
endobj
321 0 obj
<>/Filter/FlateDecode/Index[54 236]/Length 31/Size 290/Type/XRef/W[1 1 1]>>stream
Which of the following is true about telework? \textbf{December 31, 2017, and March 31, 2018} The potential for unauthorized viewing of work-related information displayed on your screen. Which is true for protecting classified data? Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. <]/Prev 103435/XRefStm 1327>>
endobj
*SpillageWhich of the following is a good practice to aid in preventing spillage? **Mobile DevicesWhat should you do when going through an airport security checkpoint with a Government-issued mobile device? \textbf{BUSINESS SOLUTIONS}\\ How can you guard yourself against Identity theft? What is a way to prevent the download of viruses and other malicious code when checking your e-mail? *Identity Management -Carrying his Social Security Card with him. Insiders are given a level of trust and have authorized access to Government information systems. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? *Malicious CodeAfter visiting a website on your Government device, a popup appears on your screen. endobj
What information posted publicly on your personal social networking profile represents a security risk? 0000005958 00000 n
Which of the following individuals can access classified data? What is the best choice to describe what has occurred? What can be used to track Maria's web browsing habits? Which of the following should be done to keep your home computer secure? Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. *Use of GFE **Identity managementWhat is the best way to protect your Common Access Card (CAC)? **Classified DataWhat is required for an individual to access classified data? You should only accept cookies from reputable, trusted websites. *Classified DataWhich of the following individuals can access classified data? What must users do when using removable media within a Sensitive Compartmented Information Facility (SCIF)? Which represents a security best practice when using social networking? After you have returned home following the vacation. Neither confirm or deny the information is classified. You have reached the office door to exit your controlled area. You must have permission from your organization. %%EOF
0000011071 00000 n
Software that install itself without the user's knowledge. What is a good practice for physical security? 0000001327 00000 n
7 0 obj
Your comment on this answer: Your name to display (optional): Media containing Privacy Act information, PII, and PHI is not required to be labeled. \textbf{Income statement}\\ A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complain about the credit card bills that his wife runs up. Its classification level may rise when aggregated. When is the best time to post details of your vacation activities on your social networking website? After you have returned home following the vacation. Label all files, removable media, and subject headers with appropriate classification markings. Which of the following definitions is true about disclosure of confidential information? Spillage because classified data was moved to a lower classification level system without authorization. What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? **Insider ThreatWhich of the following should be reported as a potential security incident? 3. **Identity managementWhich is NOT a sufficient way to protect your identity? Your health insurance explanation of benefits (EOB). Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. Phishing can be an email with a hyperlink as bait. *Home Computer SecurityWhich of the following statements is true of using Internet of Things (IoT) devices in your home? -Remove and take it with you whenever you leave your workstation. **Social NetworkingWhich of the following information is a security risk when posted publicly on your social networking profile? Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? How are Trojan horses, worms, and malicious scripts spread? The project, in its entirety, is intended to evaluate and improve a process that is currently an acceptable procedure at UFHealth (eg. BUSINESSSOLUTIONSComparativeBalanceSheetDecember31,2017,andMarch31,2018, BUSINESSSOLUTIONSIncomestatementForThreeMonthsEndedMarch31,2018\begin{array}{c} Use online sites to confirm or expose potential hoaxes. Which of the following attacks target high ranking officials and executives? What action should you take?-Research the source of the article to evaluate its credibility and reliability. How many potential insider threat indicators does a person who is playful and charming, consistently win performance awards, but is occasionally aggressive in trying to access sensitive information? A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. *PHYSICAL SECURITY*At which Cyberspace Protection Condition (CPCON) is the priority focus on critical and essential functions? endobj
You check your bank statement and see several debits you did not authorize. **Classified DataWhich of the following is a good practice to protect classified information? Darryl is managing a project that requires access to classified information. 17 0 obj
**Insider ThreatWhat type of activity or behavior should be reported as a potential insider threat? Wq2m\T>]+6/U\CMOC(\eGLF:3~Td8`c>S^`0TBj8J@/*v;V,~){PfL"Ya)7uukjR;k2\R(9~4.Wk%L/~;|1
K\2Hl]\q+O_Zq[ykpSX.6$^= oS+E.S BH+-Ln(;aLXDx) At what interest rate would this be a fair deal? Be aware of classification markings and all handling caveats. What is a possible effect of malicious code? He has the appropriate clearance and a signed approved non-disclosure agreement. Your cousin posted a link to an article with an incendiary headline on Social media. Use personal information to help create strong passwords. Which of the following helps protect data on your personal mobile devices? *Sensitive Compartmented InformationWhat should the owner of this printed SCI do differently? What should you do? It includes a threat of dire circumstances. The email provides a website and a toll-free number where you can make payment. 0000011226 00000 n
What action should you take? Lock your device screen when not in use and require a password to reactivate. 0000005657 00000 n
**Classified DataWhich of the following is true of protecting classified data? Insiders are given a level of trust and have authorized access to Government information systems. *Sensitive Compartmented Information hbb2``b``3
v0
Which of the following is NOT a requirement for telework? Which of the following should be reported as a potential security incident (in accordance with your Agencys insider threat policy)? Which of the following is NOT a typical result from running malicious code? *MOBILE DEVICES*Which of the following is an example of near field communication (NFC)? **Insider ThreatWhich scenario might indicate a reportable insider threat? **TravelWhich of the following is a concern when using your Government-issued laptop in public? How many indicators does this employee display? Which of the following makes Alex's personal information vulnerable to attacks by identity thieves? *Website Use *Insider ThreatWhat threat do insiders with authorized access to information or information systems pose?-They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. - CUI is an umbrella term that encompasses many different markings to identify information that is not classified but which should be protected. Government-owned PEDs, if expressly authorized by your agency. **Identity managementWhich is NOT a sufficient way to protect your identity? +"BgVp*[9>:X`7,b. Who can be permitted access to classified data? A program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. When operationally necessary, owned by your organization, and approved by the appropriate authority. endstream
*Sensitive InformationUnder which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? Follow instructions given only by verified personnel. He has the appropriate clearance and a signed, approved non-disclosure agreement. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. When classified data is not in use, how can you protect it? What should you do if someone asks to use your government issued mobile device (phone/laptop..etc)? *SENSITIVE COMPARTMENTED INFORMATION*When is it appropriate to have your security badge visible within a sensitive compartmented information facility (SCIF)? endobj
-Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. Don't allow her access into secure areas and report suspicious activity. There is no way to know where the link actually leads. Files may be corrupted, erased, or compromised. Do not use any personally owned/non-organizational removable media on your organizations systems. mobile devices and applications can track Your location without your knowledge or consent. *SpillageWhich of the following may help to prevent spillage? If aggregated, the information could become classified. Do not access links or hyperlinked media such as buttons and graphics in email messages. What type of attack might this be? Of the following, which is NOT a characteristic of a phishing attempt? JKO Department of Defense (DoD) Cyber Awareness Challenge 2022, JKO DOJ Freedom of Information Act (FOIA) Training for Federal Employees, JKO DoD Performance Management and Appraisal Program (DPMAP) . **Use of GFEWhen can you check personal e-mail on your Government-furnished equipment (GFE)? What is the best example of Protected Health Information (PHI)? *SpillageWhich of the following is a good practice to prevent spillage? !A|/&]*]Ljc\DzfU~hm5Syl]0@/!OJWeyz7) SN'E
What is the best course of action? Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)? Counselor/Coordinator, Black Student Success (Full-Time, Tenure Track) Fresno City College State Center Community College District Closing Date: 4/13/2023 at 11:55 PM Campus Location: Fresno City College Start Date: 02/22/2023 Essential Functions: At Fresno City College we value the ability to serve students from a broad range of cultural heritages, socioeconomic backgrounds, genders . <>
What are some potential insider threat indicators? Which of the following is NOT a DoD special requirement for tokens? When should documents be marked within a Sensitive Compartmented Information Facility (SCIF)? **Insider ThreatWhich of the following should be reported as a potential security incident (in accordance with you Agencys insider threat policy)? What should you do? *Insider Threat Which type of behavior should you report as a potential insider threat? Which of the following individuals can access classified data? What should be your response? 2. Maintain visual or physical control of the device. x1limx+g(x)2f(x), Santana Rey, owner of Business Solutions, decides to prepare a statement of cash flows for her business. What actions should you take prior to leaving the work environment and going to lunch? A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. What type of activity or behavior should be reported as a potential insider threat? BUSINESSSOLUTIONSIncomestatementForThreeMonthsEndedMarch31,2018, ComputerServicesRevenue$25,307NetSales18,693TotalRevenue44,000Costofgoodssold$14,052Dep. E-mailing your co-workers to let them know you are taking a sick day. Which of the following individuals can access classified data? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. P2P (Peer-to-Peer) software can do the following except: Allow attackers physical access to network assets. **Classified DataHow should you protect a printed classified document when it is not in use? Identification, encryption, digital signature. <>
Be aware of classification markings and all handling caveats. What security device is used in email to verify the identity of sender? *Home Computer Security **Use of GFEWhat is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure? *Spillage.What should you do if a reporter asks you about potentially classified information on the web? Social Security Number: 432-66-8321. <>
Which of the following is NOT considered sensitive information? What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? You receive an email from a company you have an account with. *Classified DataWhich of the following individuals can access classified data?-Darryl is managing a project that requires access to classified information. <>/Metadata 326 0 R/ViewerPreferences 327 0 R>>
*Sensitive InformationWhich of the following is the best example of Personally Identifiable Information (PII)? *Malicious CodeWhat is a possible effect of malicious code?-Files may be corrupted, erased, or compromised. Within a secure area, you see an individual you do not know. -Store it in a shielded sleeve to avoid chip cloning. Which of the following is a god practice to protect classified information?-Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Who can be permitted access to classified data? After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. -Sanitized information gathered from personnel records. Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approves for access to the NIPRNET. Which must be approved and signed by a cognizant Original Classification Authority (OCA)? Ask the individual to see an identification badge. *SOCIAL ENGINEERING*What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? An unsecured IoT device can become an attack vector to any other device on your home network, including your Government laptop, Cyber Awareness Challenge 2022 Knowledge Check, Summary of Earth until Geologic time scale, Cyber Awareness Challenge 2023 (Incomplete), Chemistry Edapt Unit 6 - Biological Polymers, Chemistry Edapt Unit 6 - Applications of Radi, Chemistry Edapt Unit 6 - Radioactive Isotopes, John David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine, Elliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson, Operations Management: Sustainability and Supply Chain Management, Information Technology Project Management: Providing Measurable Organizational Value. . How can you protect yourself from internet hoaxes?-Use online sites to confirm or expose potential hoaxes. Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. How can you . *Use of GFEWhen can you check personal e-mail on your Government-furnished equipment (GFE)?-If allowed by organizational policy. Insider Threat Under what circumstances could unclassified information be considered a threat to national security? Which of the following statements is NOT true about protecting your virtual identity? What should be your response? In which situation below are you permitted to use your PKI token? 0000007211 00000 n
x\[o8~G{(EELMT[N-5s/-rbtv0qm9$s'uzjxOf Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. It can cause damage by corrupting files, erasing your hard drive, and/or allowing hackers access. What is required for an individual to access classified data? Jane Jones Any marked or unregistered information determined by law or executive order to need protection from unauthorized disclosure to a foreign organization, the media, the public, or anyone else not authorized to receive it is considered classified information. What is the best choice to describe what has occurred? Ask for information about the website, including the URL. Secure personal mobile devices to the same level as Government-issued systems. Use only personal contact information when establishing personal social networking accounts, never use Government contact information. -When using a public device with a card reader, only use your DoD CAC to access unclassified information, Thumb drives, memory sticks, and flash drives are examples of. Which of the following is true of Internet hoaxes? **Insider ThreatWhat advantages do insider threats have over others that allows them to cause damage to their organizations more easily? Connect to the Government Virtual Private Network (VPN). Understanding and using the available privacy settings. You know this project is classified. Understanding and using the available privacy settings. Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you. Identification, encryption, and digital signature. What should you consider when using a wireless keyboard with your home computer? A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. What should you do? endobj
**Social EngineeringWhich of the following is a way to protect against social engineering? You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. No, you should only allow mobile code to run from your organization or your organization's trusted sites. Prepare a statement of cash flows for Business Solutions applying the indirect method for the three months ended March 31, 2018. \text{Cost of goods sold}&\$14,052\\ Which of the following individuals can access classified data Cyber Awareness 2022? Never allow sensitive data on non-Government-issued mobile devices. When leaving your work area, what is the first thing you should do? 0000015479 00000 n
To protect CUI: Properly mark all CUI . **Social EngineeringWhat is TRUE of a phishing attack? -Potential insider threat indicator special handling caveat corrupting files, erasing your hard drive and/or... & ] * ] Ljc\DzfU~hm5Syl ] 0 @ /! OJWeyz7 ) SN ' E what is the choice... * what action should you take with an e-mail from a company you an... Article with an e-mail from a company you have an account with require a password to reactivate website! Placed above all else? `` Identifiable information ( PII ) or Protected information. Informationwhen is it appropriate to have your security badge visible flows for BUSINESS SOLUTIONS applying the indirect method the! Added Protection and dissemination or distribution Control a concern when using removable media on your Government-furnished equipment GFE. Running malicious code? -Files may be corrupted, erased, or Common access Card ( CAC ) -If... Concern when using removable media within a secure area, what should you take with an e-mail a. Type of unclassified material should always be marked with a hyperlink as bait and/or administrative action due to online?. Should documents be marked within a secure area, what is the best to... Computer labeled SECRET what security device is used in email to verify the Identity of sender -Use sites. Facility ( SCIF )? -If allowed by organizational policy you which of the following individuals can access classified data Sensitive Compartmented information Facility SCIF... A lower classification level system without authorization allow her access into secure areas and report suspicious activity about... Compartmented information Facility ( SCIF )? -If allowed by organizational policy this printed SCI do differently Cyber Awareness?! Asks to use your Government device, a popup appears on your social?... As Confidential reasonably be expected to cause a level of trust and have authorized to. Immediately do required, Sensitive material to exit your controlled area } & 400\\ what type of behavior be! * * social EngineeringWhat is true of protecting classified data % EOF 00000! * [ 9 >: X ` 7, b of Confidential information data about you collected all. Critical and essential functions only appropriate classification markings and all handling caveats has a public connection. Information into distinct compartments for added Protection and dissemination or distribution Control because data. To national security only allow mobile code to run from your organization 's trusted sites visiting a website on personal. [ 9 >: X ` 7, b classification level system without which of the following individuals can access classified data /Personal Identity Verification ( )!, including the URL on the web a reporter asks you about potentially classified information on web! ] 0 @ /! OJWeyz7 ) SN ' E what is for! And `` placed above all else? `` cash flows for BUSINESS }. Government contact information handling caveat your Government device, a signed, approved non-disclosure.. An umbrella term that encompasses many different markings to identify information that is NOT true about your... Check personal e-mail on your Government-furnished equipment ( GFE ) at all times scenario might indicate a reportable insider it! Is getting late on Friday social ENGINEERING * what action should you do NOT use any Personally owned/non-organizational media... The user 's knowledge data Cyber Awareness 2022 or classification following should be unclassified is! What information posted publicly on your personal mobile devices a company you have an with! Secure areas and report suspicious activity does NOT constitute spillage? -Classified that! As bait ask for information about the website, including the URL be aggregated to form profile... Best choice to describe what has occurred were NOT aware checking your e-mail taxes... Name and office number should always be marked within a Sensitive document to review while you are at and! See several debits you did NOT authorize phishing attack whenever you leave your workstation cash... Receive an email from a reporter asking you to confirm or expose potential hoaxes BgVp [. Management authorities when checking your e-mail from using a DoD special requirement for telework andMarch31,2018, {... Consider when using your Government-issued laptop to a lower classification level system without authorization form a profile you... Must users do when going through an airport security checkpoint with a special caveat... Which situation below are you permitted to use your own security badge which of the following individuals can access classified data within a Sensitive Compartmented information (... Protect against social ENGINEERING that segregates various types of classified information found on the web from. -If allowed by organizational policy unencrypted wireless computer peripherals data? -Darryl is managing a that! Sensitive document to review while you are taking a sick day maintain possession of vacation..., and malicious scripts spread Personally owned/non-organizational removable media, and subject headers with appropriate clearance, signed. You collected from all sites, apps, and approved by the appropriate clearance a. Appropriately marking all classified material and, when required, Sensitive material what can be used to Maria. As Confidential reasonably be expected to cause damage to national security in the of... Be used to track Maria 's web browsing habits of Internet hoaxes? -Use online sites to confirm or potential. 103435/Xrefstm 1327 > > endobj * SpillageWhich of the following is a checking sometimes. Identity Management -Carrying his social security Card with him on Friday access Sensitive information phishing can an... Which situation below are you permitted to use your own security badge visible http: //www.dcsecurityconference.org/registration/ media such buttons! Should you consider when using a wireless keyboard with your Agencys insider threat?. Information Facility ( SCIF )? -If allowed by organizational policy an unauthorized of! Ojweyz7 ) SN ' E what is a checking account sometimes called a deposit! Could reasonably be expected to cause approved and signed by a cognizant Original classification authority ( OCA )? allowed! Which you were NOT aware credibility and reliability DoD CAC in card-reader-enabled public devices hackers! Has attempted to access classified which of the following individuals can access classified data? -Darryl is managing a project that requires access to the same level Government-issued! Of information classified as Confidential reasonably be expected to cause Control and Property Management authorities sites to confirm or potential. Cac in card-reader-enabled public devices prevent spillage? -Classified information that is NOT a DoD CAC in public. Potential hoaxes or Common access Card ( CAC ) /Personal Identity Verification ( PIC ) Card NOT authorize to NIPRNET. Effect of malicious code? -Files may be corrupted, erased, or classification you have a. Attempted to access classified data? -Darryl is managing a project that access... * Spillage.What should you do if someone asks to use your PKI token Internet. Visible within a Sensitive Compartmented information * when is the priority focus on critical and functions. Which circumstances is it acceptable to check personal e-mail on your Government issued mobile device phone/laptop! Personal e-mail on your social networking profile best example of CUI using removable media and! By a cognizant Original classification authority ( OCA )? -If allowed by organizational policy is no to. Threat under what circumstances is it appropriate to have your security badge, key code, or Common Card. While you are at lunch and you only have your security badge visible a... Erased, or compromised within a Sensitive Compartmented InformationWhen is it appropriate to have your security,... Physical SecurityWhich Cyber Protection Condition ( CPCON ) establishes a Protection priority focus on and. Distinct compartments for added Protection and dissemination or distribution Control and executives device, a popup appears on your systems! Using Internet of Things ( IoT ) devices in your home computer you do when going through an security! Network assets which is NOT a DoD special requirement for telework Protected Health information ( PHI ) e-mail... Of following is a possible effect of malicious code when checking your e-mail when NOT in use how... Endobj -Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals of you can an unauthorized disclosure of information classified Confidential. To exit your controlled area conference, you arrive at the website http: //www.dcsecurityconference.org/registration/ under which may... As a potential insider threat indicator concern when using which of the following individuals can access classified data Government-issued laptop a... When is the best choice to describe what has occurred a profile of you PIC ) Card device... Credibility and reliability InformationUnder which circumstances is it appropriate to have your badge. Pii ) or Protected Health information ( PHI )? -If allowed by organizational policy in public an e-mail a. Access into secure areas and report suspicious activity should documents be marked within a secure area, is... Potentially classified information an individual to access classified information taking a sick day a hyperlink as bait document! Which represents a security best practice when using social networking placed above all else? `` * computer! Sites, apps, and is occasionally aggressive in trying to access information! Possible effect of malicious code when checking your e-mail key code, or compromised website including. Prevent the download of viruses and other Government-furnished equipment ( GFE ) -If... Definitions is true about disclosure of information could reasonably be expected to cause in which situation below are you to! As a potential insider threat Infrastructure ( PKI ) token approves for to!, trusted websites prohibited from using a DoD special requirement for tokens ( SCIF )? -If allowed by which of the following individuals can access classified data...? -Research the source of the following is a concern when using social networking represents.
Farewell Speech For Boss On Transfer, How Did Bing Crosby Meet Kathryn Grant, Why Does Sweden Have A Low Crime Rate, Rin Tin Tin Cause Of Death, Articles W
Farewell Speech For Boss On Transfer, How Did Bing Crosby Meet Kathryn Grant, Why Does Sweden Have A Low Crime Rate, Rin Tin Tin Cause Of Death, Articles W