which of the following is true about unclassified data

How can you avoid downloading malicious code? Select the information on the data sheet that is personally identifiable information (PII). What is required for an individual to access classified data? Which of the following is NOT a social engineering tip? Q&A for work. *Spillage What should you do when you are working on an unclassified system and receive an email with a classified attachment? Decline So That You Maintain Physical Control of Your Government-Issued Laptop. Validate friend requests through another source before confirming them. (Malicious Code) What is a common indicator of a phishing attempt? Discuss why gases, such as barbecue propane gas, are sold by mass and not by volume. Which of the following is a best practice for physical security? *Spillage You find information that you know to be classified on the Internet. Which of the following best describes good physical security? Neither confirm or deny the information is classified. BMW crash victim Alaa Al-Siddiq was on Cotswolds birthday weekend **Social Networking Which piece if information is safest to include on your social media profile? **Insider Threat How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? Store it in a locked desk drawer after working hours. You check your bank statement and see several debits you did not authorize. (Spillage) After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. How many potential insider threat indicators does this employee display? When using a fax machine to send sensitive information, the sender should do which of the following? Which of the following is true of Unclassified Information? *Spillage Which of the following actions is appropriate after finding classified information on the Internet? Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. Which of the following is NOT an appropriate way to protect against inadvertent spillage? A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complain about the credit card bills that his wife runs up. true-statement. internet-quiz. Which of the following is an example of removable media? -It must be released to the public immediately. Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive new car, and has unexplained absences from work. You must have your organization's permission to telework c. You may use unauthorized software as long as your computer's antivirus software is up to date. CUI is not classified information. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. Based on the description that follows, how many potential insider threat indicator (s) are displayed? You may use your personal computer as long as it is in a secure area in your home b. (Spillage) What should you do if a reporter asks you about potentially classified information on the web? Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Hostility or anger toward the United States and its policies. **Social Networking Which of the following statements is true? What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure? Lionel stops an individual in his secure area who is not wearing a badge. What should be your response? E-mailing your co-workers to let them know you are taking a sick day. What is the best course of action? What is NOT Personally Identifiable Information (PII)? Which of the following is NOT a security best practice when saving cookies to a hard drive? The attributes of identified ground seeds are modified to ground points. You must have your organizations permission to telework. What should you do? Remove and take it with you whenever you leave your workstation. Lock your device screen when not in use and require a password to reactivate. Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you. Since the URL does not start with https, do not provide your credit card information. Unclassified documents do not need to be marked as a SCIF. A medium secure password has at least 15 characters and one of the following. Always take your CAC when you leave your workstation. **Classified Data Which of the following must you do before using and unclassified laptop and peripherals in a collateral environment? CPCON 4 (Low: All Functions) Read the latest news from the Controlled Unclassified Information (CUI) program. Which of the following should you NOT do if you find classified information on the internet? Figure 1. The CUI Registry is the Government-wide online repository for Federal-level guidance regarding CUI policy and practice. A .gov website belongs to an official government organization in the United States. In the following situations, determine if the duty describes would be one of the Fed is responsible or is not responsible to enforce. An official website of the United States government. Make note of any identifying information and the website URL and report it to your security office. Your comments are due on Monday. Store it in a locked desk drawer after working hours. What action should you take? **Classified Data What is required for an individual to access classified data? **Social Engineering Which may be a security issue with compressed Uniform Resource Locators (URLs)? How many insider threat indicators does Alex demonstrate? Classified information that should be unclassified and is downgraded. Some examplesyou may be familiar with: TheFederalCUI Registry,shows authorized categoriesandassociated markings, as well as applicable safeguarding, dissemination, and decontrol procedures. Search by Location. Never write down the PIN for your CAC. Unclassified Information Student Guide . Never allow sensitive data on non-Government-issued mobile devices. A measure of how much useful work each unit of input energy provides. Have your permissions from your organization, follow your organization guideline, use authorized equipment and software, employ cyber security best practice, perform telework in dedicated when home. Which of the following is true about unclassified data? In addition to avoiding the temptation of greed to betray his country, what should Alex do differently? (Mobile Devices) When can you use removable media on a Government system? Refer the reporter to your organizations public affairs office. 4. Always check to make sure you are using the correct network for the level of data. After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. the following is true about unclassified data fy23 controlled unclassified information cui quizlet what is true of controlled unclassified information What. NARAissuespolicy directives and publishesan annualreportto the President of the United Stateson the status of agency CUI Program implementation in accordance with Executive Order 13556, Controlled Unclassified Information. Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information? The Chinese Spy Balloon Showdown The discovery of a Chinese surveillance balloon floating over the United States has added to the rising tensions between the two superpowers. Teams. **Insider Threat How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? Contents hide. What should you consider when using a wireless keyboard with your home computer? (Identity Management) What certificates are contained on the Common Access Card (CAC)? If authorized, what can be done on a work computer? (Insider Threat) A colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. Which of the following statements is true? What is a way to prevent the download of viruses and other malicious code when checking your e-mail? How many potential insider threat indicators does this employee display? How should you respond? Which of the following does not constitute spillage. Insiders are given a level of trust and have authorized access to Government information systems. Like the number of people in a class, the number of fingers on your hands, or the number of children someone has. **Social Engineering Which of the following is a way to protect against social engineering? Your favorite movie. *Spillage What should you do if you suspect spillage has occurred? **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? (Spillage) What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? A vendor conducting a pilot program with your organization contacts you for organizational data to use in a prototype. DoD Unclassified data: Must be cleared before being released to the public May require applci aton i of Controled l Uncasl sed Iifi nformaton i (CU)I access and distribution controls Must be clearly marked as Unclassified or CUI if included in a classified document or classified storage area Not correct. Software that installs itself without the users knowledge. Infographic - Text version Infographic [PDF - 594 KB] Report a problem or mistake on this page Date modified: 2020-12-14 (GFE) When can you check personal e-mail on your Government-furnished equipment (GFE)? Memory sticks, flash drives, or external hard drives. Amendments to a variety of policy documents as well as others referencing Confidential Business Information (CBI) submissions or handling, Changes to paper and e-forms and instructions for their submission to EPA. Linda encrypts all of the sensitive data on her government-issued mobile devices. which of the following is true about unclassified data. The popup asks if you want to run an application. What action is recommended when somebody calls you to inquire about your work environment or specific account information? (Sensitive Information) What certificates are contained on the Common Access Card (CAC)? Unknown data is categorized by the system; an analyst then reviews the results Correct. Which of the following is true of downloading apps? What certificates are contained on the Common Access Card (CAC)? Explain. What is a best practice for protecting controlled unclassified information (CUI)? You know that this project is classified. which of the following is true about unclassified data. All to Friends Only. Phishing can be an email with a hyperlink as bait. A coworker brings a personal electronic device into prohibited areas. (Correct) -It does not affect the safety of Government missions. What is the best response if you find classified government data on the internet? **Insider Threat What is an insider threat? When teleworking, you should always use authorized and software. Power off any mobile devices when entering a secure area. What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? Use only personal contact information when establishing personal social networking accounts, never use Government contact information. What is required for an individual to access classified data? Malicious code can do the following except? correct. *Sensitive Information Under which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? not correct What should you do to protect classified data? What should be your response? Maria is at home shopping for shoes on Amazon.com. All data transfers via the internet are not 100% secure and there might be some security vulnerabilities. Report the crime to local law enforcement. As a best practice, labeling all classified removable media and considering all unlabeled removable media as unclassified. It should only be in a system while actively using it for a PKI-required task. To determine premiums for automobile insurance, companies must have an understanding of the variables that affect whether a driver will have an accident. A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. *Spillage What should you do if a reporter asks you about potentially classified information on the web? It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. Use a single, complex password for your system and application logons. Create separate user accounts with strong individual passwords. (Sensitive Information) What should you do if a commercial entity, such as a hotel reception desk, asks to make a photocopy of your Common Access Card (CAC) for proof of Federal Government employment? Which of the following may help to prevent spillage? Use only personal contact information when establishing your personal account. Which of the following is an example of punishment by application? **Home Computer Security Which of the following is a best practice for securing your home computer? Who is responsible for information/data security? Only paper documents that are in open storage need to be marked. EPAs CUI Program is responsible for issuing CUI policy, procedures, training, and guidance to program offices and regions, along with providing oversight and reporting on the Agencys progress on meeting NARAs CUI deadlines. What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered? Federal agencies routinely generate, use, store, and share information that, while not classified, still requires some level of protection from unauthorized access and release. Jozeal. What can you do to protect yourself against phishing? Identification, encryption, and digital signature. What type of social engineering targets senior officials? which of the following is true about unclassified data - Soetrust Which of the following is NOT an example of Personally Identifiable Information (PII)? How can you protect your information when using wireless technology? Ensure that any cameras, microphones, and Wi-Fi embedded in the laptop are physically disabled.- Correct. Malicious code can mask itself as a harmless e-mail attachment, downloadable file, or website. Compute The Average Kids Per Family. What type of security is part of your responsibility and placed above all else?, If your wireless device is improperly configured someone could gain control of the device? Information improperly moved from a higher protection level to a lower protection level. What action should you take? What Should You Do When Working On An Unclassified System And Receive Your health insurance explanation of benefits (EOB). Do not access website links in e-mail messages. It is releasable to the public without clearance. A coworker removes sensitive information without approval. Prudence faxes CUI using an Unclassified cover sheet via a Secret fax machine. Learn more about Teams A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. What should you do if someone asks to use your government issued mobile device (phone/laptop..etc)? correct. Search **Removable Media in a SCIF What portable electronic devices (PEDs) are allowed in a Sensitive Compartmented Information Facility (SCIF)? Unclassified information is a threat to national security. Retrieve classified documents promptly from printers. Use online sites to confirm or expose potential hoaxes, Follow instructions given only by verified personnel, Investigate the links actual destination using the preview feature, Determine if the software or service is authorized. (Sensitive Information) Which of the following is NOT an example of sensitive information? Which of the following is a practice that helps to protect you from identity theft? This button displays the currently selected search type. 1.1.5 Controlled Unclassified Information. How do you respond? Search for an answer or ask Weegy. You receive a call on your work phone and youre asked to participate in a phone survey. not correct Which of the following is NOT true of traveling overseas with a mobile phone? Scan external files from only unverifiable sources before uploading to computer. (1) A strategic plan documenting the overall conduct of a war. Is it permitted to share an unclassified draft document with a non-DoD professional discussion group? Please click here to see any active alerts. As long as the document is cleared for public release, you may share it outside of DoD. *Sensitive Compartmented Information What should the owner of this printed SCI do differently? (Answer) CPCON 2 (High: Critical and Essential Functions) CPCON 1 (Very High: Critical Functions) CPCON 3 (Medium: Critical, Essential, and Support Functions) CPCON 4 (Low: All Functions) CPCON 5 (Very Low: All Functions). Cyber Challenge.txt - Cyber Awareness What should you do Use only your personal contact information when establishing your account. An investment in knowledge pays the best interest.. Store your Common Access Card (CAC) or Personal Identity Verification (PIV) card in a shielded sleeve ~Write your password down on a device that only you access (e.g., your smartphone) Change your password at least every 3 months Enable two-factor authentication whenever available, even for personal accounts. A type of phishing targeted at high-level personnel such as senior officials. **Identity Management Which of the following is the nest description of two-factor authentication? Debra ensures not correct When vacation is over, after you have returned home. Approved Security Classification Guide (SCG). A coworker removes sensitive information without authorization. Which of the following is NOT an example of CUI? Ensure that the wireless security features are properly configured. a. putting a child in time-out Access requires a formal need-to-know determination issued by the Director of National Intelligence.? cyber-awareness. **Travel Which of the following is true of traveling overseas with a mobile phone? Memory sticks, flash drives, or external hard drives. Which of the following represents an ethical use of your Government-furnished equipment (GFE)? Which of the following is NOT true concerning a computer labeled SECRET? How do you think antihistamines might work? Which is a risk associated with removable media? How do you respond? Being cognizant of classification markings and labeling practices are good strategies to avoid inadvertent spillage. Matt Monroe, a 20-year U. S. Air Force veteran and current operations manager at Omnistruct, explains the breakdown, "There are four classified information categories in the military based on the severity of damage that the information's release would cause.