Note any identifying information, such as the website's URL, and report the situation to your security POC. Connect to the Government Virtual Private Network (VPN). Which is NOT a way to protect removable media? not correct. This is information that, if released to the public, carries no injury to personal, industry, or government interests. Which of the following must you do before using an unclassified laptop and peripherals in a collateral classified environment? Spillage because classified data was moved to a lower classification level system without authorization. f. Get an answer. Which of the following is a security best practice for protecting Personally Identifiable Information (PII)? If you participate in or condone it at any time. (Spillage) Which of the following is a good practice to aid in preventing spillage? Amendments to a variety of policy documents as well as others referencing Confidential Business Information (CBI) submissions or handling, Changes to paper and e-forms and instructions for their submission to EPA. Store classified data appropriately in a GSA-approved vault/container when not in use. Which of the following does not constitute spillage. How do you respond? **Mobile Devices What can help to protect the data on your personal mobile device? (Malicious Code) What is a common indicator of a phishing attempt? Question 1: The business impact analysis (BIA) identifies the resources for which a business continuity plan (BCP) is necessary. **Classified Data What level of damage can the unauthorized disclosure of information classified as Confidential reasonably be expected to cause? **Classified Data Which of the following is true of protecting classified data? Leaked classified or controlled information is still classified/controlled even if it has already been compromised. Controlled Unclassified Information (CUI): Controlled Unclassified information was defined in the Executive Order 13556 as information held by or generated for the Federal Government that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations and government-wide policies that isn't classified (Spillage) Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. 5. Figure 1. This answer has been confirmed as correct and helpful. Which of the following is an example of a strong password? Confirm the individuals need-to-know and access. What information most likely presents a security risk on your personal social networking profile? You must have your organizations permission to telework. Paul verifies that the information is CUI, includes a CUI marking in the subject header and digitally signs an e-mail containing CUI. CPCON 4 (Low: All Functions) This lets the service person know when the tank is "full." What should you do if a reporter asks you about potentially classified information on the web? UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. Which of the following is true of Controlled Unclassified information (CUI)? You can't have 1.9 children in a family (despite what the census might say ). Correct Which designation marks information that does not have potential to damage national security? Ensure proper labeling by appropriately marking all classified material. You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. The emission rate of CO 2 from the soils reached the maximum on the 1st day of incubation and the sequence of CO 2 emission rate and cumulative emission under different amendment treatments was as SG > S > G > CK > N (Fig. correct. Software that installs itself without the users knowledge. How many potential insider threat indicators does this employee display? **Insider Threat What do insiders with authorized access to information or information systems pose? Which of the following is a security best practice when using social networking sites? Unauthorized Disclosure of Classified Information for DoD, Security Awareness: Derivative Classification Answers, CITI Ethics, Responsible Conduct, RCR, Law, HTH And IRB Answers, EVERFI Achieve Consumer Financial Education Answers, Security Pro: Chapter 3 (3.1.8) & 4.1 Security Policies Answers, CITI Module #3 Research in Public Elementary and Secondary Schools, Answers to CTS Unit 7 Lab 7-2: Protocols and Services SNMP, Google Analytics Individual Qualification Exam Answers, Everfi Module 4 Credit Scores Quiz Answers, Which Of The Following Is Not Considered A Potential Insider Threat Indicator. **Physical Security Within a secure area, you see an individual who you do not know and is not wearing a visible badge. Note That The Integers Should Be Type Cast To Doubles. Which of the following is NOT an example of CUI? (Sensitive Information) What guidance is available from marking Sensitive Information information (SCI)? Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? *Spillage Which of the following may help to prevent spillage? How should you securely transport company information on a removable media? (Sensitive Compartmented Information) Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)? A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. (Sensitive Information) What should you do if a commercial entity, such as a hotel reception desk, asks to make a photocopy of your Common Access Card (CAC) for proof of Federal Government employment? Which of the following is true about unclassified data? Write your password down on a device that only you access. Adversaries exploit social networking sites to disseminate fake news Correct. Store your Common Access Card (CAC) or Personal Identity Verification (PIV) card in a shielded sleeve ~Write your password down on a device that only you access (e.g., your smartphone) Change your password at least every 3 months Enable two-factor authentication whenever available, even for personal accounts. A coworker has asked if you want to download a programmers game to play at work. Discuss why gases, such as barbecue propane gas, are sold by mass and not by volume. What should you do to protect yourself while on social networks? Your password and a code you receive via text message. *Insider Threat Which of the following is a potential insider threat indicator? If authorized, what can be done on a work computer? Proactively identify potential threats and formulate holistic mitigation responses. **Travel Which of the following is true of traveling overseas with a mobile phone? Correct. What does Personally Identifiable Information (PII) include? (Sensitive Information) What type of unclassified material should always be marked with a special handling caveat? Ive tried all the answers and it still tells me off, part 2. New interest in learning another language, Which of the following is a good practice to protect classified information. Discrete data involves whole numbers (integers - like 1, 356, or 9) that can't be divided based on the nature of what they are. How can you guard yourself against Identity theft? cyber. 1.1.2 Classified Data. However, unclassified data. The following practices help prevent viruses and the downloading of malicious code except. That trust is bounded by the Oath of Office we took willingly. **Social Networking Which of the following information is a security risk when posted publicly on your social networking profile? JavaScript appears to be disabled on this computer. (Sensitive Information) Which of the following is NOT an example of sensitive information? Course Introduction Introduction . Which may be a security issue with compressed Uniform Resource Locators (URLs)? What can be used to track Marias web browsing habits? (Correct)-It does not affect the safety of Government missions.-It never requires classification markings. What should be done if you find classified Government Data/Information Not Cleared for Public Release on the Internet? -It never requires classification markings. The website requires a credit card for registration. If you receive a phone call from a stranger asking for information about your invoice payment process, you should: Crucial information about a user or organization can be gained through. What is the best course of action? Only allow mobile code to run from your organization or your organizations trusted sites. They can become an attack vector to other devices on your home network. Lionel stops an individual in his secure area who is not wearing a badge. Which of the following is NOT a DoD special requirement for tokens? A colleague enjoys playing video games online, regularly use social media, and frequently forgets to secure her smartphone elsewhere before entering areas where it is prohibited. The email states your account has been compromised and you are invited to click on the link in order to reset your password. Linda encrypts all of the sensitive data on her government-issued mobile devices. Follow the steps enlisted below to use WEKA for identifying real values and nominal attributes in the dataset. What should you do? Unclassified information cleared for public release. **Identity management Which of the following is NOT a best practice to preserve the authenticity of your identity? Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. **Identity management Which is NOT a sufficient way to protect your identity? Which of the following is NOT a correct way to protect CUI? Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)? Which of the following is NOT considered a potential insider threat indicator? **Identity management Which of the following is an example of two-factor authentication? Which of the following is true of Protected Health Information (PHI)? **Insider Threat What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? Classified DVD distribution should be controlled just like any other classified media. Only use Government-furnished or Government-approved equipment to process PII. Top Secret information could be expected to cause exceptionally grave damage to national security of disclosed. Classified information that should be unclassified and is downgraded. A coworker removes sensitive information without authorization. *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Which of the following is a proper way to secure your CAC/PIV?