**TravelWhat security risk does a public Wi-Fi connection pose? & \text { Cost leadership } & \text { Cost leadership } & \text { Cost leadership } \\ Which of the following is a best practice for securing your home computer? *Website UseWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? Annual DoD Cyber Awareness Challenge Exam -DELETE THE EMAIL. Use only your personal contact information when establishing your account, *Controlled Unclassified InformationSelect the information on the data sheet that is personally identifiable information (PII) but not protected health information (PHI), Jane JonesSocial Security Number: 123-45-6789, *Controlled Unclassified InformationSelect the information on the data sheet that is protected health information (PHI), Interview: Dr. Nora BakerDr. **Social EngineeringWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? Spillage because classified data was moved to a lower classification level system without authorization. cyber. Senior government personnel, military or civilian. DOD Cyber Awareness 2021 Knowledge Check Cyber Awareness Challenge Complete Questions and Answers @870zpVxh%X'pxI[r{+i#F1F3020d`_ if>}xp20Nj9: bL As Chinas growth slows, income inequality speeds up Which of the following is an example of near field communication (NFC)?-A smartphone that transmits credit card payment information when held in proximity to a credit card reader. Try to observe the direction taken and any other useful information and immediately make a report to your security point of contact. Note any identifying information and the website's Uniform Resource Locator (URL). Unusual interest in classified information. WebThings required to access classified information: Signed SF 312. Which of the following is an example of a strong password? Cyber Awareness Challenge 2022 *Malicious CodeWhich of the following is NOT a way that malicious code spreads? %PDF-1.4 % Structured data are usually human readable and can be indexed. Darryl is managing a project that requires access to classified information. Which of the following False Which of the following is NOT sensitive information? trailer \text { Production site } & \text { France } & \text { France } & \text { France } & \text { France } Be aware of classification markings and all handling caveats. Hostility or anger toward the United States and its policies. Identifiable Information tastes. **Insider ThreatWhich of the following is NOT considered a potential insider threat indicator? Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? He has the appropriate clearance and a signed, approved non-disclosure agreement. WebWhich of the following is NOT a criterion used to grant an individual access to classified data? What type of activity or behavior should be reported as a potential insider threat? Smiths report notes that French consumers have strong bargaining power over the industry. Which of the following individuals can access classified data? Which type of behavior should you report as a potential insider threat? What should you do? Which of the following terms refers to someone who harms national security through authorized access to information system? Which of the following is NOT a typical means for spreading malicious code? Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Dr. Baker reports that the sessions addressed Ms. Jones's depression, which poses no national security risk. Which of the following is true of protecting classified data? In the body of Smiths report, she What are some potential insider threat indicators? **Identity managementWhich of the following is an example of two-factor authentication? A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. What portable electronic devices (PEDs) are permitted in a SCIF? 0000041351 00000 n *Insider Threat Which type of behavior should you report as a potential insider threat? The projected additional sales revenue in year 111 is $75,000\$ 75,000$75,000, with associated expenses of $25,000\$ 25,000$25,000. *Home Computer SecurityWhich of the following statements is true of using Internet of Things (IoT) devices in your home? *SpillageA user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. At the beginning of the year, Bryers Incorporated reports inventory of $8,000. WebThere are a number of individuals who can access classified data. No, you should only allow mobile code to run from your organization or your organization's trusted sites. What should you do? A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complain about the credit card bills that his wife runs up. Which may be a security issue with compressed URLs? WebAccess is only permitted to individuals after determining they have a need to know. In setting up your personal social networking service account, what email address should you use? 0000004517 00000 n A colleague saves money for an overseas vacation every year, is a single father, and occasionally consumes alcohol. Data classification is the process of analyzing structured or unstructured data and organizing it into categories based on file type, contents, and other metadata. How can you guard yourself against Identity theft? Which Of The Following Individuals Can Access Classified Data **Social EngineeringWhat is a common indicator of a phishing attempt? Data Classification true traveling overseas mobile phone cyber awareness. Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. Use online sites to confirm or expose potential hoaxes, social engineering that is targeted at individuals, groups or organizations, Which of the following is a concern when using your government-issued laptop in public. *Insider ThreatWhat threat do insiders with authorized access to information or information systems pose?-They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. Cyber Awareness Challenge 2022 Information Security Darryl is managing a project that requires access to classified information. What must you ensure if you work involves the use of different types of smart card security tokens? **Social EngineeringWhat is TRUE of a phishing attack? Memory sticks, flash drives, or external hard drives. **Classified DataWhich of the following is a good practice to protect classified information? Ask for information about the website, including the URL. When is it appropriate to have your securing badge visible with a sensitive compartmented information facility. by producing wine in bottles with curved necks, which increases its cost structure. WebAccess is only permitted to individuals after determining they have a need to know. It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. ALL OF THE ABOVE WebWhich of the following individuals can access classified data? What should you do when you are working on an unclassified system and receive an email with a classified attachment? DoD Cyber Awareness 2019 *Sensitive Compartmented InformationWhen should documents be marked within a Sensitive Compartmented Information Facility (SCIF). Directives issued by the Director of National Intelligence. Access to classified information A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. Based on the description that follows, how many potential insider threat indicator(s) are displayed? What information posted publicly on your personal social networking profile represents a security risk? Remove your security badge after leaving your controlled area or office building. Do not access website links, buttons, or graphics in e-mail. Classified material must be appropriately marked. Follow instructions given only by verified personnel. Cyber Awareness 2022 I Hate CBT's Since the URL does not start with "https," do not provide you credit card information. Darryl is managing a project that requires access to classified information. Need-to-know is a determination that an individual requires access to specific classified information in the performance of (or assist in the performance of) lawful and authorized government functions and duties. Web*Classified Data Which of the following individuals can access classified data?-Darryl is managing a project that requires access to classified information. JKO Department of Defense (DoD) Cyber Awareness Challenge 2022 *Social NetworkingWhich of the following is a security best practice when using social networking sites? How should you respond to the theft of your identity? Annual DoD Cyber Awareness Challenge Exam Don't talk about work outside your workspace unless it is a specifically designated public meeting environment and is controlled by the event planners. consolidate in order to survive. What is a possible indication of a malicious code attack in progress? startxref hb```b``a`e`b`@ x`d`XV461ql04F;N8J(^ 1dIi&:=qA@ 1UPn l&% %@,f42@fg!s-fN+L! *Social NetworkingYour cousin posted a link to an article with an incendiary headline on social media. Which Of The Following Individuals Can Access Classified Data **Home Computer SecurityWhat should you consider when using a wireless keyboard with your home computer? 1 Answer 0 votes answered Aug 3, 2022 by kabita (13.8k points) Best answer Only persons with appropriate clearance, a non-disclosure agreement, and need-to **TravelWhich of the following is true of traveling overseas with a mobile phone? **Insider ThreatWhich of the following should be reported as a potential security incident? WebDOL internal policy specifies the following security policies for the protection of PII and other sensitive data: It is the responsibility of the individual user to protect data to which they have access. Suggestions for dealing with these problems include encouraging the when is it appropriate to have your security bagde visible? 0000011226 00000 n *Social EngineeringWhat is a common indicator of a phishing attempt? He has the appropriate clearance and a signed, approved non-disclosure agreement. What should you do? What action should you take? It may expose the connected device to malware. 0000015315 00000 n Which of the following He has the appropriate clearance and a signed, approved, non-disclosure agreement. 0000015479 00000 n 0000006207 00000 n **Physical SecurityAt which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? What is a proper response if spillage occurs. **Physical SecurityWhich Cyber Protection Condition (CPCON) is the priority focus on critical and essential functions only? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Something you possess like a CAC, and a Pin or Password. WebThis information can come in the form of, but is not limited to, podcasts, print articles, internet-based articles, books, journals, speeches, television broadcasts, blogs, and postings. Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. Phishing can be an email with a hyperlink as bait. In which situation below are you permitted to use your PKI token? Annual DoD Cyber Awareness Challenge Exam Cover sheets will be used to protect classified documents from inadvertent disclosure while in use. Annual DoD Cyber Awareness Challenge Exam Cyber Awareness Challenge 2022 Information Security Which of the following *Malicious CodeWhat are some examples of malicious code? DOD Cyber Awareness 2021 Knowledge Check true-statement. Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? Which of the following is a way to protect against social engineering? Spillage occurs when information is spilled from a higher classification or protection level to a lower classification or protection level. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. View e-mail in plain text and don't view e-mail in Preview Pane. . Data classification is the process of analyzing structured or unstructured data and organizing it into categories based on file type, contents, and other metadata. WebBe aware of classification markings and all handling caveats. What action should you take if you receive a friend request on your social networking website from someone in Germany you met casually at a conference last year? WebWhich of the following is NOT a criterion used to grant an individual access to classified data? WebWhich of the following individuals can access classified data? The data are listed in the accompanying table. Refer the reporter to your organization's public affairs office. Which of the following individuals can access classified data? If aggregated, the information could become classified. **Insider ThreatWhich scenario might indicate a reportable insider threat? WebClassified information that should be unclassified and is downgraded. Quizlet *Sensitive Compartmented InformationWhen faxing Sensitive Compartmented Information (SCI), what actions should you take? Which Of The Following Individuals Can Access Classified Data