Directives issued by the Director of National Intelligence. It never requires classification markings, is true about unclassified data. (Answer) CPCON 2 (High: Critical and Essential Functions) CPCON 1 (Very High: Critical Functions) CPCON 3 (Medium: Critical, Essential, and Support Functions) CPCON 4 (Low: All Functions) CPCON 5 (Very Low: All Functions). They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. c. ignoring a tantrum A program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. *Spillage Which of the following is a good practice to aid in preventing spillage? (Malicious Code) Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? correct. Your password and the second commonly includes a text with a code sent to your phone. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? Controlled Unclassified Information (CUI) and Covered Defense **Travel What security risk does a public Wi-Fi connection pose? Unauthorized Disclosure of Classified Information for DoD, Security Awareness: Derivative Classification Answers, CITI Ethics, Responsible Conduct, RCR, Law, HTH And IRB Answers, EVERFI Achieve Consumer Financial Education Answers, Security Pro: Chapter 3 (3.1.8) & 4.1 Security Policies Answers, CITI Module #3 Research in Public Elementary and Secondary Schools, Answers to CTS Unit 7 Lab 7-2: Protocols and Services SNMP, Google Analytics Individual Qualification Exam Answers, Everfi Module 4 Credit Scores Quiz Answers, Which Of The Following Is Not Considered A Potential Insider Threat Indicator. The popup asks if you want to run an application. A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? **Insider Threat What type of activity or behavior should be reported as a potential insider threat? Examples are: Patient names, Social Security numbers, Drivers license numbers, insurance details, and birth dates. Use TinyURL's preview feature to investigate where the link leads. You can email your employees information to yourself so you can work on it this weekend and go home now. (Mobile Devices) When can you use removable media on a Government system? Correct. What is a security best practice to employ on your home computer? which of the following is true about unclassified data - Weegy Which of the following is true of Controlled Unclassified information (CUI)? Classified material must be appropriately marked. Which of the following best describes wireless technology? Refer the reporter to your organizations public affairs office. Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? Which of the following is a practice that helps to protect you from identity theft? Controlled Unclassified Information (CUI) Program Frequently Asked As long as the document is cleared for public release, you may share it outside of DoD. If possible, set your browser preferences to prompt you each time a website wants to store a cookie. Your cousin posted a link to an article with an incendiary headline on social media. (Spillage) Which of the following is a good practice to aid in preventing spillage? Which is NOT a way to protect removable media? The answer has been confirmed to be correct. What actions should you take with a compressed Uniform Resource Locator (URL) on a website known to you? ~A coworker brings a personal electronic device into a prohibited area. The date of full implementation of the CUI Program will be announced by the EPAs CUI Senior Agency Official (CUI SAO) and updated here on EPAs public web page. Personal information is inadvertently posted at a website. (Sensitive Information) What should you do if a commercial entity, such as a hotel reception desk, asks to make a photocopy of your Common Access Card (CAC) for proof of Federal Government employment? Some examplesyou may be familiar with: TheFederalCUI Registry,shows authorized categoriesandassociated markings, as well as applicable safeguarding, dissemination, and decontrol procedures. A medium secure password has at least 15 characters and one of the following. However, agency personnel and contractors should first consult their agency's CUI implementing policies and program management for guidance. Which of the following is true of transmitting Sensitive Compartmented Information (SCI)? *Insider Threat Which of the following is a reportable insider threat activity? Correct. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? Which of these are true of unclassified data? - Answers What information most likely presents a security risk on your personal social networking profile? Cyber Awareness 2022 I Hate CBT's You are reviewing your employees annual self evaluation. **Social Engineering Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? correct. Which of the following is NOT a correct way to protect CUI? Decline to let the person in and redirect her to security. Maria is at home shopping for shoes on Amazon.com. Which designation includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? Telework is only authorized for unclassified and confidential information. Refer the reporter to your organizations public affairs office. Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. What should be done if you find classified Government Data/Information Not Cleared for Public Release on the Internet? Remove and take it with you whenever you leave your workstation. Which of the following is true of the Common Access Card (CAC)? You find information that you know to be classified on the Internet. What should be your response? A coworker removes sensitive information without authorization. *Spillage What should you do if you suspect spillage has occurred? Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? **Mobile Devices Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. Where. What actions should you take prior to leaving the work environment and going to lunch? All https sites are legitimate and there is no risk to entering your personal info online. Here you can find answers to the DoD Cyber Awareness Challenge. What Is True About Unclassified Information Note the websites URL and report the situation to your security point of contact. Ensure proper labeling by appropriately marking all classified material. Unclassified documents do not need to be marked as a SCIF. -Ask them to verify their name and office number Which of the following is an example of two-factor authentication? General Services Administration (GSA) approval. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? Keep your operating system and software up to date: This will help patch any security vulnerabilities in your software. Transmit classified information via fax machine only Not correct not correct View email in plain text and dont view email in Preview Pane. This lets the service person know when the tank is "full." Make note of any identifying information and the website URL and report it to your security office. A coworker brings a personal electronic device into prohibited areas. Correct. What describes how Sensitive Compartmented Information is marked? (Correct) -It does not affect the safety of Government missions. Use only personal contact information when establishing your personal account. Which of the following individuals can access classified data? Your health insurance explanation of benefits (EOB). What is the best choice to describe what has occurred? cyber-awareness. Learn more about Teams **Social Engineering Which of the following is a way to protect against social engineering? Which of the following is not considered an example of data hiding? Store it in a locked desk drawer after working hours. How should you securely transport company information on a removable media? Always use DoD PKI tokens within their designated classification level. What should you do? A pop-up window that flashes and warns that your computer is infected with a virus. (Spillage) What should you do when you are working on an unclassified system and receive an email with a classified attachment? The website requires a credit card for registration. Paul verifies that the information is CUI, includes a CUI marking in the subject header and digitally signs an e-mail containing CUI. Which of the following is true of using DoD Public key Infrastructure (PKI) token? 1.1.1 Spillage. You have reached the office door to exit your controlled area. Follow procedures for transferring data to and from outside agency and non-Government networks. (Spillage) Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? How many potential insider threat indicators is Bob displaying? Software that installs itself without the users knowledge. The following practices help prevent viruses and the downloading of malicious code except. the following is true about unclassified data fy23 controlled unclassified information cui quizlet what is true of controlled unclassified information What. PII includes, but is not limited to, social security numbers, date and places of birth, mothers maiden names, biometric records, and PHI. Which of the following best describes the sources that contribute to your online identity. Which of the following is true of sharing information in a Sensitive Compartmented Information Facility (SCIF)? You must have your organization's permission to telework c. You may use unauthorized software as long as your computer's antivirus software is up to date. What Should You Do When Working On An Unclassified System And Receive Use online sites to confirm or expose potential hoaxes, Follow instructions given only by verified personnel, Investigate the links actual destination using the preview feature, Determine if the software or service is authorized. Classified material must be appropriately marked. PDF Unauthorized Disclosure of Classified Information and Controlled - CDSE Which of the following is true of downloading apps? When unclassified data is aggregated, its classification level may rise. What can help to protect the data on your personal mobile device. (Spillage) After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Cyber Awareness Flashcards by Jedi Master | Brainscape Report the crime to local law enforcement. (Sensitive Information) Which of the following represents a good physical security practice? Which scenario might indicate a reportable insider threat security incident? What action should you take first? You receive a call on your work phone and youre asked to participate in a phone survey.