A lock (LockA locked padlock) or https:// means youve safely connected to the .gov website. Executive Order 13526 Classified National Security Information, PersonallyIdentifiable Information (PII), Sensitive Personally Identifiable Information (SPII), Proprietary Business Information (PBI) or currently known within EPA as Confidential Business Information (CBI), Unclassified Controlled Technical Information (UCTI). Controlled Unclassified Information (CUI) and Covered Defense PDF IFS0026 Student Guide - CDSE Never allow sensitive data on non-Government-issued mobile devices. Which of the following is a good practice to avoid email viruses? Try this test to determine if it's considered unclassified, classified or protected, and check out tips on what to do and what not to do when working with sensitive information. UNCLASSIFIED - CLASSIFICATION MARKINGS FOR TRAINING PURPOSES ONLY Marking in the Electronic Environment Short Student Guide Center for Development of Security Excellence Page 4 UNCLASSIFIED - CLASSIFICATION MARKINGS FOR TRAINING PURPOSES ONLY IM and Chat Instant messages and chats are brief, text-based message exchanges and conversations. Which of the following statements is true? **Insider Threat How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? cyber-awareness. Which of the following is a best practice for physical security? Correct. Which of the following may help to prevent spillage? Which of the following is NOT a correct way to protect sensitive information? Click on "Open File". What describes how Sensitive Compartmented Information is marked? (controlled unclassified information) Which of the following is NOT correct way to protect CUI? Which of the following is not a best practice to preserve the authenticity of your identity? Is it okay to run it? (Spillage) Which of the following is a good practice to aid in preventing spillage? What is the best choice to describe what has occurred? Paul verifies that the information is CUI, includes a CUI marking in the subject header and digitally signs an e-mail containing CUI. Which of the following is true of internet hoaxes? Refer the reporter to your organizations public affairs office. On a NIPRNET system while using it for a PKI-required task. Which of the following is an example of a strong password? Note any identifying information and the websites URL. Based on the description that follows, how many potential insider threat indicator (s) are displayed? Maybe. If you receive a phone call from a stranger asking for information about your invoice payment process, you should: Crucial information about a user or organization can be gained through. Which designation marks information that does not have potential to damage national security? How can you protect data on your mobile computing and portable electronic devices (PEDs)? Before long she has also purchased shoes from several other websites. Rating. Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. cyber. Spillage occurs when information is spilled from a higher classification or protection level to a lower classification or protection level. Is it permitted to share an unclassified draft document with a non-DoD professional discussion group? What should you do? **Social Engineering What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? How should you securely transport company information on a removable media? The annual Cyber Awareness Challenge is a course that helps authorized users learn how to best avoid and reduce threats and vulnerabilities in an organizations system. **Classified Data Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? Reviewing and configuring the available security features, including encryption. **Social Networking When is the safest time to post details of your vacation activities on your social networking website? Let us have a look at your work and suggest how to improve it! In setting up your personal social networking service account, what email address should you use? Insiders are given a level of trust and have authorized access to Government information systems. Federal agencies routinely generate, use, store, and share information that, while not meeting the threshold for classification as national security or atomic energy information, requires some level of protection from unauthorized access and release. #2) Select the "Pre-Process" tab. We recommend Norton Security or McAfee Total Protection. PII, PHI, and financial information is classified as what type of information? What level of damage can the unauthorized disclosure of information classified as Top Secret reasonably be expected to cause? How many potential insider threat indicators is Bob displaying? How should you respond? Store it in a locked desk drawer after working hours. How should you respond? Working With Sensitive Information - Canada.ca Top Secret information could be expected to cause exceptionally grave damage to national security of disclosed. What should you do? A pop-up window that flashes and warns that your computer is infected with a virus. Remove security badge as you enter a restaurant or retail establishment. What should you do? (Spillage) When is the safest time to post details of your vacation activities on your social networking website? Which is NOT a method of protecting classified data? When can you check personal email on your government furnished equipment? **Removable Media in a SCIF What must users ensure when using removable media such as compact disk (CD)? Organizational Policy Not correct Malicious code can mask itself as a harmless e-mail attachment, downloadable file, or website. Controlled unclassified information. Chinese Hackers Steal Unclassified Data From Navy Contractor (Correct) -It does not affect the safety of Government missions. A type of phishing targeted at high-level personnel such as senior officials. Follow procedures for transferring data to and from outside agency and non-Government networks. 5. true-statement. Spillage because classified data was moved to a lower classification level system without authorization. What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web? You have reached the office door to exit your controlled area. Everything you need to know aboutControlled UnclassifiedInformation(CUI). Found a mistake? correct. Which of the following should be reported as a potential security incident? Avoid talking about work outside of the workplace or with people without a need-to-know. Which of following is true of protecting classified data? When using a public device with a card reader, only use your DoD CAC to access unclassified information, is only allowed if the organization permits it. The Chinese Spy Balloon Showdown The discovery of a Chinese surveillance balloon floating over the United States has added to the rising tensions between the two superpowers. You receive an inquiry from a reporter about government information not cleared for public release. It is releasable to the public without clearance. Which of the following is true of sharing information in a Sensitive Compartmented Information Facility (SCIF)? Original classification authority Correct. Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? How many insider threat indicators does Alex demonstrate? Its classification level may rise when aggregated. If authorized, what can be done on a work computer? In addition to offering an overview of cybersecurity best practices, the challenge also provides awareness of potential and common cyber threats. A man you do not know is trying to look at your Government-issued phone and has asked to use it. *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. correct. Which of the following is NOT a correct way to protect CUI? Secure .gov websites use HTTPS Use online sites to confirm or expose potential hoaxes, Follow instructions given only by verified personnel, Investigate the links actual destination using the preview feature, Determine if the software or service is authorized. (Travel) Which of the following is a concern when using your Government-issued laptop in public? (Sensitive Information) What type of unclassified material should always be marked with a special handling caveat? Official websites use .gov What action should you take? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. P2P (Peer-to-Peer) software can do the following except: Allow attackers physical access to network assets. **Social Networking Which of the following information is a security risk when posted publicly on your social networking profile? **Identity management What is the best way to protect your Common Access Card (CAC)? BMW crash victim Alaa Al-Siddiq was on Cotswolds birthday weekend A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. *Spillage What should you do if a reporter asks you about potentially classified information on the web? Which of the following is true of telework? What should be done to sensitive data on laptops and other mobile computing devices? Use a common password for all your system and application logons. What is the danger of using public Wi-Fi connections? Which of the following is NOT true of traveling overseas with a mobile phone? classified-document. *Controlled Unclassified Information Which of the following is NOT an example of CUI? Which of the following is a good practice to protect classified information? What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? Effects of different carbon substrates on PAHs fractions and microbial Read the latest news from the Controlled Unclassified Information (CUI) program. Added 8/5/2020 8:06:16 PM. 1 Cyber Awareness Challenge 2023 Answers. Set hasDigit to true if the 3-character passCode contains a digit, Critical, Essential, and Support Functions. Unauthorized Disclosure of Classified Information for DoD, Security Awareness: Derivative Classification Answers, CITI Ethics, Responsible Conduct, RCR, Law, HTH And IRB Answers, EVERFI Achieve Consumer Financial Education Answers, Security Pro: Chapter 3 (3.1.8) & 4.1 Security Policies Answers, CITI Module #3 Research in Public Elementary and Secondary Schools, Answers to CTS Unit 7 Lab 7-2: Protocols and Services SNMP, Google Analytics Individual Qualification Exam Answers, Everfi Module 4 Credit Scores Quiz Answers, Which Of The Following Is Not Considered A Potential Insider Threat Indicator. After clicking on a link on a website, a box pops up and asks if you want to run an application. It contains certificates for identification, encryption, and digital signature. **Identity management Which of the following is NOT a best practice to preserve the authenticity of your identity?