Connect to the Government Virtual Private Network (VPN). c. What similarities and differences are there between plant and animal cells? Correct. Updated 8/5/2020 8:06:16 PM. This bag contains your government-issued laptop. Of the following, which is NOT a security awareness tip? *Controlled Unclassified Information Which of the following is NOT an example of CUI? Which of the following represents a good physical security practice? ~A coworker brings a personal electronic device into a prohibited area. Jozeal. not correct. While it may seem safer, you should NOT use a classified network for unclassified work. When unclassified data is aggregated, its classification level may rise. **Mobile Devices Which of the following helps protect data on your personal mobile devices? *Spillage Which of the following is a good practice to prevent spillage? How should you respond? (Spillage) Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? Note the websites URL and report the situation to your security point of contact. Alexa May, director of accounts, received a bill for $648\$648$648, dated April 666, with sales terms 2/10,1/15,n/302/10, 1/15, n/302/10,1/15,n/30. Have your permissions from your organization, follow your organization guideline, use authorized equipment and software, employ cyber security best practice, perform telework in dedicated when home. A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. You must have your organization's permission to telework. How should you securely transport company information on a removable media? **Classified Data Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? In addition to offering an overview of cybersecurity best practices, the challenge also provides awareness of potential and common cyber threats. Everything you need to know aboutControlled UnclassifiedInformation(CUI). "Unclassified" or a lack of security marking denotes non-sensitive information. Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)? (Sensitive Compartmented Information) What portable electronic devices (PEDs) are allow in a Secure Compartmented Information Facility (SCIF)? Secure personal mobile devices to the same level as Government-issued systems. Position your monitor so that it is not facing others or easily observed by others when in use Correct. Use a single, complex password for your system and application logons. **Social Networking Your cousin posted a link to an article with an incendiary headline on social media. What should you do if someone forgets their access badge (physical access)? What type of data must be handled and stored properly based on classification markings and handling caveats? Others may be able to view your screen. Linda encrypts all of the sensitive data on her government issued mobile devices. By Quizzma Team / Technology. **Mobile Devices Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? When operationally necessary, owned by your organization, and approved by the appropriate authority. Of the following, which is NOT a characteristic of a phishing attempt? **Classified Data Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? Ask the individual to see an identification badge. Search by Subject Or Level. After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. You receive an unexpected email from a friend: "I think you'll like this: (URL)" What action should you take? To transmit large payments through Fedwire __________, To regulate and supervise the stock market to provide stability and security to individual investors. Note any identifying information, such as the website's URL, and report the situation to your security POC. Ensure proper labeling by appropriately marking all classified material. correct. Information improperly moved from a higher protection level to a lower protection level. Search They broadly describe the overall classification of a program or system. At all times while in the facility. Which of the following is an example of a strong password? Share sensitive information only on official, secure websites. If aggregated, the information could become classified. Confirm the individuals need-to-know and access. Quizzma is a free online database of educational quizzes and test answers. (GFE) When can you check personal e-mail on your Government-furnished equipment (GFE)? *Sensitive Compartmented Information What should the owner of this printed SCI do differently? (Correct) -It does not affect the safety of Government missions. All of these. Following instructions from verified personnel. How can you guard yourself against Identity theft? What type of security is part of your responsibility and placed above all else?, If your wireless device is improperly configured someone could gain control of the device? There are no choices provides which make it hard to pick the untrue statement about unclassified data. Mark SCI documents appropriately and use an approved SCI fax machine. **Insider Threat What function do Insider Threat Programs aim to fulfill? . Photos of your pet Correct. Found a mistake? Which of the following is an example of punishment by application? Which of the following is NOT a potential insider threat? Mobile devices and applications can track your location without your knowledge or consent. Your cousin posted a link to an article with an incendiary headline on social media. View email in plain text and dont view email in Preview Pane. Use personally-owned wired headsets and microphones only in designated areas, New interest in learning a foreign language. What function do Insider Threat Programs aim to fulfill? Which of the following is NOT a social engineering tip? Which of the following best describes good physical security? (Sensitive Information) Which of the following is true about unclassified data? **Identity management What is the best way to protect your Common Access Card (CAC)? Not correct. **Identity management Which is NOT a sufficient way to protect your identity? cyber-awareness. Store it in a locked desk drawer after working hours. Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approves for access to the NIPRNET. Which of the following is NOT a correct way to protect CUI? Hostility or anger toward the United States and its policies. We thoroughly check each answer to a question to provide you with the most correct answers. The email states your account has been compromised and you are invited to click on the link in order to reset your password. Follow procedures for transferring data to and from outside agency and non-Government networks. (Spillage) What type of activity or behavior should be reported as a potential insider threat? The proper security clearance and indoctrination into the SCI program. For Government-owned devices, use approved and authorized applications only. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Which of the following is NOT considered sensitive information? Which of the following is true of Unclassified information? Software that installs itself without the users knowledge. How can you protect yourself on social networking sites? A colleague saves money for an overseas vacation every year, is a . Your health insurance explanation of benefits (EOB). What should you do if a reporter asks you about potentially classified information on the web? Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. true-statement. Which of the following is an example of malicious code? Only documents that are classified Secret, Top Secret, or SCI require marking. Which of the following is NOT Government computer misuse? Report the crime to local law enforcement. You can email your employees information to yourself so you can work on it this weekend and go home now. Which of the following is a concern when using your Government-issued laptop in public? When is it okay to charge a personal mobile device using government-furnished equipment (GFE)? A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. It never requires classified markings, it is true about unclassified data. **Travel Which of the following is true of traveling overseas with a mobile phone? New answers. **Social Networking Which of the following statements is true? Annual DoD Cyber Awareness Challenge Training, DOD Cyber Awareness Challenge 2019: Knowledge, DOD Cyber Awareness Challenge 2019 (DOD-IAA-V, Operations Management: Sustainability and Supply Chain Management, Elliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson, Anderson's Business Law and the Legal Environment, Comprehensive Volume, David Twomey, Marianne Jennings, Stephanie Greene. *Spillage Which of the following may help prevent inadvertent spillage? **Insider Threat Which of the following should be reported as a potential security incident? What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? Which of the following is true of the Common Access Card (CAC) or Personal Identity Verification (PIV) card? internet. What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? not correct Correct. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. Looking at your MOTHER, and screaming THERE SHE BLOWS! correct. Classified information is defined in PL 96-456, the Classified Information Procedures Act: Correct, Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. What should you do to protect classified data? What should you do? When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. They can be part of a distributed denial-of-service (DDoS) attack. You have reached the office door to exit your controlled area. What should you do? Historically, each agency developed its own practices for sensitive unclassified information, resulting in a patchwork of systems across the Executive branch, in which similar information might be defined or labeled differently, or where dissimilar information might share a definition and/or label. A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. **Physical Security What is a good practice for physical security? Correct CUI was established to standardize the way the Executive branch handles sensitive information that requires dissemination controls. At EPA, the CUI Program is housed in the Libraries and Accessibility Division (LAD) within the Office of Mission Supports (OMS), Office of Enterprise Information Programs (OEIP). When teleworking, you should always use authorized and software. After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Which of the following actions can help to protect your identity? Follow procedures for transferring data to and from outside agency and non-Government networks. After clicking on a link on a website, a box pops up and asks if you want to run an application. cyber. Which of the following is NOT a typical result from running malicious code? Refer the reporter to your organizations public affairs office. You are having lunch at a local restaurant outside the installation, and you find a cd labeled favorite song. Which of these is true of unclassified data? What should you do? The National Archives and Records Administration (NARA) serves as the Controlled Unclassified Information (CUI) Executive Agent (EA). CUI is not classified information. Is this safe? Correct. -TRUE What action is recommended when somebody calls you to inquire about your work environment or specific account information? Which of the following is NOT a criterion used to grant an individual access to classified data? Which of the following is a clue to recognizing a phishing email? A coworker brings a personal electronic device into prohibited areas. UNCLASSIFIED - CLASSIFICATION MARKINGS FOR TRAINING PURPOSES ONLY Marking in the Electronic Environment Short Student Guide Center for Development of Security Excellence Page 4 UNCLASSIFIED - CLASSIFICATION MARKINGS FOR TRAINING PURPOSES ONLY IM and Chat Instant messages and chats are brief, text-based message exchanges and conversations. a. ALways mark classified information appropriately and retrieve classified documents promptly from the printer. What is a best practice for protecting controlled unclassified information (CUI)? Discrete data involves whole numbers (integers - like 1, 356, or 9) that can't be divided based on the nature of what they are. Many apps and smart devices collect and share your personal information and contribute to your online identity. Which of the following best describes wireless technology? When using your government-issued laptop in public environments, with which of the following should you be concerned? **Insider Threat Which scenario might indicate a reportable insider threat? **Travel What security risk does a public Wi-Fi connection pose? A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? Which of the following is NOT one? Do not access website links in e-mail messages. Correct. (Correct) -It does not affect the safety of Government missions. 1 Cyber Awareness Challenge 2023 Answers. SSN, date and place of birth, mothers maiden name, biometric records, PHI, passport number, Subset of PII, health information that identifies the individual, relates to physical or mental health of an individual, provision of health care to an individual, or payment of healthcare for individual. Only paper documents that are in open storage need to be marked. How many indicators does this employee display? Store it in a shielded sleeve to avoid chip cloning. What type of social engineering targets particular individuals, groups of people, or organizations? Spillage occurs when information is spilled from a higher classification or protection level to a lower classification or protection level. Setting weekly time for virus scan when you are not on the computer and it is powered off. Its classification level may rise when aggregated. Controlled unclassified information. Keep your operating system and software up to date: This will help patch any security vulnerabilities in your software. What should you do? Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? Spear Phishing attacks commonly attempt to impersonate email from trusted entities. Which of the following is true about telework? Even within a secure facility, dont assume open storage is permitted. Why might "insiders" be able to cause damage to their organizations more easily than others? Please click here to see any active alerts. A medium secure password has at least 15 characters and one of the following. It never requires classification markings, is true about unclassified data. What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)? #1) Open WEKA and select "Explorer" under 'Applications'. Linda encrypts all of the sensitive data on her government-issued mobile devices. Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know, Insiders are given a level of trust and have authorized access to Government information systems. Which of the following is not a best practice to preserve the authenticity of your identity? Telework is only authorized for unclassified and confidential information. Do not forward, read further, or manipulate the file; Do not give out computer or network information, Do not follow instructions from unverified personnel. Which is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF). Which of the following is a best practice for handling cookies? It may be compromised as soon as you exit the plane. Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. *Sensitive Compartmented Information When is it appropriate to have your security badge visible? Being cognizant of classification markings and labeling practices are good strategies to avoid inadvertent spillage. Store it in a locked desk drawer after working hours. *Sensitive Information Under what circumstances could classified information be considered a threat to national security? Learn more about Teams not correct. What does Personally Identifiable Information (PII) include? Which designation marks information that does not have potential to damage national security? Which of the following actions is appropriate after finding classified Government information on the internet?