There is no way to know where the link actually leads. (Physical Security) which Cyberspace Protection Condition (CPCON) establishes a protection priority focus on critical and essential functions only? What is a valid response when identity theft occurs? Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only? Correct. Linda encrypts all of the sensitive data on her government-issued mobile devices. (Wrong). *Spillage What should you do when you are working on an unclassified system and receive an email with a classified attachment? Report the crime to local law enforcement. Software that installs itself without the users knowledge. Search by Subject Or Level. Exceptionally grave damage to national security. Personal information is inadvertently posted at a website. (Sensitive Information) What certificates are contained on the Common Access Card (CAC)? A coworker removes sensitive information without approval. What can be used to track Marias web browsing habits? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. (Sensitive Information) Which of the following represents a good physical security practice? Which is an untrue statement about unclassified data? not correct 4. Set hasDigit to true if the 3-character passCode contains a digit, Critical, Essential, and Support Functions. To transmit large payments through Fedwire __________, To regulate and supervise the stock market to provide stability and security to individual investors. What type of social engineering targets senior officials? Phishing can be an email with a hyperlink as bait. What is required for an individual to access classified data? **Social Engineering Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? tell your colleague that it needs to be secured in a cabinet or container. What are the requirements to be granted access to sensitive compartmented information (SCI)? If classified information were released, which classification level would result in Exceptionally grave damage to national security? correct. Since the URL does not start with https, do not provide your credit card information. Cyber Awareness Challenge Knowledge Check 2023 Answers, Cyber Awareness Challenge 2022 Knowledge Check Answers. Store it in a locked desk drawer after working hours. This answer has been confirmed as correct and helpful. A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI_________.??? Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? Following instructions from verified personnel. Seeker - Vacancy - Detail Overview New answers. *Social Networking Is it okay to run it? Your password and the second commonly includes a text with a code sent to your phone. Let us know if this was helpful. A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Found a mistake? Which of the following may be helpful to prevent inadvertent spillage? Which of the following should you do immediately? Use only personal contact information when establishing personal social networking accounts, never use Government contact information. *Controlled Unclassified Information Which of the following is NOT a correct way to protect CUI? CUI may be stored on any password-protected system. CUI may be stored on any password-protected system. **Insider Threat Which of the following should be reported as a potential security incident (in accordance with you Agencys insider threat policy)? On a NIPRNET system while using it for a PKI-required task. (Sensitive Information) Which of the following is NOT an example of sensitive information? Make note of any identifying information and the website URL and report it to your security office. Rating. (Malicious Code) Which email attachments are generally SAFE to open? Attempting to access sensitive information without need-to-know, Avoid talking about work outside of the workplace or with people without a need-to-know, Report the suspicious behavior in accordance with their organizations insider threat policy. ! (A type of phishing targeted at senior officials) Which is still your FAT A$$ MOTHER! Don't talk about work outside your workspace unless it is a specifically designated public meeting environment and is controlled by the event planners. By Quizzma Team / Technology. **Social Engineering Which may be a security issue with compressed Uniform Resource Locators (URLs)? Which of the following is NOT a typical result from running malicious code? **Mobile Devices Which of the following helps protect data on your personal mobile devices? You know this project is classified. Which of the following is true of Controlled Unclassified information (CUI)? Store it in a GSA approved vault or container. Unclassified Information Student Guide . Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. Prudence faxes CUI using an Unclassified cover sheet via a Secret fax machine. What should you do if someone asks to use your government issued mobile device (phone/laptop..etc)? not correct All to Friends Only. How do you respond? What should you do? true-statement. You know this project is classified. What type of attack might this be? The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. It contains certificates for identification, encryption, and digital signature. Hostility or anger toward the United States and its policies. Maria is at home shopping for shoes on Amazon.com. A 3%3\%3% penalty is charged for payment after 303030 days. **Social Networking What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sites visited? You should only accept cookies from reputable, trusted websites. Which of the following is a good practice for telework? Retrieve classified documents promptly from printers. *Insider Threat Which of the following is a reportable insider threat activity? A Common Access Card and Personal Identification Number. Classified Information can only be accessed by individuals with. (social networking) Which of the following is a security best practice when using social networking sites? Dofficult life circumstances, such as death of spouse. When operationally necessary, owned by your organization, and approved by the appropriate authority. Unclassified is a security classification assigned to official information that does not warrant the assignment of Confidential, Secret, or Top Secret markings but which is not publicly-releasable without authorization. Some examplesyou may be familiar with: TheFederalCUI Registry,shows authorized categoriesandassociated markings, as well as applicable safeguarding, dissemination, and decontrol procedures. What information relates to the physical or mental health of an individual? e. Why do Elodea and onion cells have more consistent shapes than human epithelial cells? What Should You Do When Working On An Unclassified System And Receive Based on the description that follows, how many potential insider threat indicator(s) are displayed? Quizzma is a free online database of educational quizzes and test answers. Click on "Open File". 1.1 Standard Challenge Answers. (GFE) When can you check personal e-mail on your Government-furnished equipment (GFE)? Which of the following is an example of removable media? Which scenario might indicate a reportable insider threat? -Its classification level may rise when aggregated. BMW crash victim Alaa Al-Siddiq was on Cotswolds birthday weekend Correct. You know that this project is classified. c. What similarities and differences are there between plant and animal cells? Controlled unclassified information. Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. (social networking) When is the safest time to post details of your vacation activities on your social networking profile? When expanded it provides a list of search options that will switch the search inputs to match the current selection. We recommend Norton Security or McAfee Total Protection. Decline So That You Maintain Physical Control of Your Government-Issued Laptop. **Identity management What is the best way to protect your Common Access Card (CAC)? No. View email in plain text and dont view email in Preview Pane. *Spillage .What should you do if a reporter asks you about potentially classified information on the web? Course Introduction Introduction . Validate all friend requests through another source before confirming them. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. What is a possible indication of a malicious code attack in progress? (Identity Management) Which of the following is an example of two-factor authentication? Which of the following is not a best practice to preserve the authenticity of your identity? What is the basis for the handling and storage of classified data? Permitted Uses of Government-Furnished Equipment (GFE). When can you check personal email on your government furnished equipment? I may decide not to consent to these terms, but, if I do not consent to all of these terms, then I agree not to proceed with creating an account or moving forward with filling out the application, and I understand that I will not be . Click the card to flip Flashcards Learn Test Match Created by Jamie_Lancaster Terms in this set (24) Alex demonstrates a lot of potential insider threat indicators. What should you do? What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? **Insider Threat What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? (Spillage) Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? (Sensitive Information) What type of unclassified material should always be marked with a special handling caveat? Classified data: (Scene) Which of the following is true about telework? **Use of GFE When can you check personal e-mail on your Government-furnished equipment (GFE)? DOD Cyber Awareness Challenge 2019 Flashcards | Quizlet Correct. (Malicious Code) What are some examples of removable media? Ch 1 Flashcards by Josh Selkirk | Brainscape Which of the following is a potential insider threat indicator? Controlled Unclassified Information - Defense Counterintelligence and **Classified Data Which classification level is given to information that could reasonably be expected to cause serious damage to national security? -It never requires classification markings. 1.1.4 Social Networking. Which designation marks information that does not have potential to damage national security? Note any identifying information, such as the websites URL, and report the situation to your security POC. Correct. A. Attempting to access sensitive information without need-to-know. Which of the following is true about unclassified data? *Spillage Which of the following is a good practice to prevent spillage? Correct. Classified material must be appropriately marked. Which method would be the BEST way to send this information? How can you protect data on your mobile computing and portable electronic devices (PEDs)? Your comments are due on Monday. When would be a good time to post your vacation location and dates on your social networking website? Accepting the default privacy settings. Note That The Integers Should Be Type Cast To Doubles. What should you do if a reporter asks you about potentially classified information on the web? Do not access website links in e-mail messages. (social networking) When may you be subjected to criminal, disciplinary, and/or administrative action due to online misconduct? Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI. **Social Engineering How can you protect yourself from internet hoaxes? Spillage occurs when information is spilled from a higher classification or protection level to a lower classification or protection level. Malicious code can do damage by corrupting files, erasing your hard drive, and/or allowing hackers access. Linda encrypts all of the sensitive data on her government-issued mobile devices. Which is an untrue statement about unclassified data? (Correct) -It does not affect the safety of Government missions. Of the following, which is NOT a characteristic of a phishing attempt? **Home Computer Security Which of the following is a best practice for securing your home computer? A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. 8. (Spillage) After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Phishing can be an email with a hyperlink as bait. Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. What should be done to sensitive data on laptops and other mobile computing devices? *Sensitive Compartmented Information What must the dissemination of information regarding intelligence sources, methods, or activities follow?