A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. Physical Security: (Incident #1): What should the employee do differently? Use of GFE (Incident): Permitted Uses of Government-Furnished Equipment (GFE) A No to all: Viewing or downloading pornography, gambling online, conducting a private money-making venture, using unauthorized software, Illegally downloading copyrighted material, making unauthorized configuration changes. Validate friend requests through another source through another source before confirming them. You are leaving the building where you work. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. What is the best example of Protected Health Information (PHI)? What action should you take? Sensitive information may be stored on any password-protected system. Use a digital signature when sending attachments or hyperlinks. You know that this project is classified. In addition to avoiding the temptation of greed to betray his country, what should Alex do differently? all non-redacted elements of the final terms and conditions, all non-redacted elements of the contract schedules. View email in plain text and dont view email in Preview Pane. When can you check personal email on your government furnished equipment? For each of the items (a) through (l), indicate whether the proper answer is a debit or a credit. OR-2020-013. You must have your organizations permission to telework. Which of the following is true of transmitting Sensitive Compartmented Information (SCI)? Which of the following best describes good physical security? On a NIPRNet system while using it for a PKI-required taskC. How Do I Answer The CISSP Exam Questions? Sanitized information gathered from personnel records. Firewall disabled. (Malicious Code) A coworker has asked if you want to download a programmers game to play at work. Porton Down Store classified data appropriately in a GSA-approved vault/container. hVo0W*$E*TG-%V$ %d|#I 1!=#"b$!'1Xr$8vG}z|C/B Let us know if this was helpful. Controlled Unclassified Information: (Victim) Select the information on the data sheet that is personally identifiable information (PII) but not protected health information (PHI). Insider threat: (Marks statement): What should Alexs colleagues do? Which of the following is true of Internet of Things (IoT) devices? Government Furnished Equipment: GFE refers to tooling or equipment thats provided to a contractor for use during the project . Is it permitted to share an unclassified draft document with a non-DoD professional discussion group? Opening the link would allow the sender to steal Isabels information. It refers to property used by a contractor during a DoD government contract. Which of the following is an example of Protected Health Information (PHI)? % You are working at your unclassified system and receive an email from a coworker containing a classified attachment. https://intranet.hhs.gov/about-hhs/national-security/policy/gfe-foreign-travel-2018. What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web? c. Both of these, Use of GFE (Incident): Permitted Uses of Government-Furnished Equipment (GFE). Exit. Use your legitimate antivirus software to perform a virus scan instead. 1068 0 obj <> endobj Controlled Unclassified Information: (Victim) Select the information on the data sheet that is protected health information (PHI). 0-`*0r+u,1+~p]"WC0`=0uG!o8zGkv57?8/ssmZ]bw>V3^aiKPH(pUcWqR)u KmPy (TL2 Consider the various information sources listed previously in developing your answer. How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? A program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. !qB I }h\;3. 6ggq~|:s]kZ]G QXW+"?REz0@z:Zg3>xCi3/Jr[/e,jVIW~7"{?Q3 We use technology readiness levels (TRL) to give an indication of an innovation. Laptop (Take CAC out), PIN note (Never write your PIN. Correct. **Social Networking As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? *Sensitive Compartmented Information When should documents be marked within a Sensitive Compartmented Information Facility (SCIF). E-mailing your co-workers to let them know you are taking a sick day. Which of the following actions can help tp protect your identity? Then select Submit. Examples are: Patient names, Social Security numbers, Drivers license numbers, insurance details, and birth dates. Illegally downloading copyrighted material - No **Social Networking What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sires visited? You should only accept cookies from reputable, trusted websites. \text{Liability}&&\text{Debit}&\\ Three or more. Which of the following is NOT a correct way to protect sensitive information? Upon connecting your Government- issued laptop to a public wireless connection, what should you immediately do? For your proposal to be accepted for assessment, you must tick a box to confirm your organisations unqualified acceptance of DASA terms and conditions for the respective competition. What does Personally Identifiable Information (PII) include? Article - Pneumatic Compression Devices - Policy Article (A52488) This must include the overall price, but not a breakdown of the pricing structure if that detailed information can be redacted under the Freedom of Information Act. If you have a product and are looking to become a defence supplier, you may wish to speak to the MOD Defence Suppliers Service. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. (Identity Management) Which of the following is an example of two-factor authentication? Which of the following is a good practice to protect classified information? Controlled unclassified information. A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive new car, and has unexplained absences from work. What should be your response? Transmit classified information via fax machine only Not correct (Spillage) Which of the following is a good practice to aid in preventing spillage? You will also be required to provide a longer and more detailed abstract that will remain confidential. \text{Balance sheet accounts:}\\ Heres how you know. When considering Government contracts, there are two approaches that are used for providing the equipment necessary to execute the contract. c. Only connect to known networks, Travel (Incident): What is the danger of using public Wi-Fi connections? Which of the following is true about URLs? Compute The Average Kids Per Family. Classified data: (Theory) Which of the following is true of protecting classified data? ;A- fKpe'xfX@na=lzt Qh|(j@SYG}~1BY/6:{HqMvD` KNZ/)t\+b*"gO1s a. You are logged on to your unclassified computer and just received an encrypted email from a co-worker. &\textbf{Increas}&\textbf{Decrease}&\textbf{Normal Balance}\\ **Identity management Which is NOT a sufficient way to protect your identity? (Spillage) What type of activity or behavior should be reported as a potential insider threat? What should Sara do when publicly available Internet, such as hotel Wi-Fi? A coworker removes sensitive information without approval. A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. endstream endobj 1074 0 obj <>stream **Social Networking Which of the following best describes the sources that contribute to your online identity? Even within a secure facility, dont assume open storage is permitted. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. Correct Use only personal contact information when establishing your personal account. *Spillage Which of the following may help to prevent spillage? What should you do after you have ended a call from a reporter asking you to confirm potentially classified information found on the web? The property provided to contractors for repair or overhaul is not subject to the requirements of the paragraph of bullet #2 above in this section. Based on the description that follows, how many potential insider threat indicator(s) are displayed? Based on the description that follows, haw many potential insider threat indicator(s) are displayed? Software that installs itself without the users knowledge. (Malicious Code) What is a good practice to protect data on your home wireless systems? Which of the following is true of downloading apps? Neither confirm or deny the information is classified. Which is an appropriate use of government e-mail? All https sites are legitimate. The proper security clearance and indoctrination into the SCI program. You many only transmit SCI via certified mail. You must supply a completed Form 388 and CV for any new research workers. (controlled unclassified information) Which of the following is NOT an example of CUI? Note any identifying information and the websites Uniform Resource Locator (URL). Which of the following actions is appropriate after finding classified Government information on the internet? A headset with a microphone through a Universal Serial Bus (USB) port. a. Storage devices (e.g., USB memory sticks, hard drives, etc.) Hostility or anger toward the United States and its policies. You must have your organization's permission to telework. Write your password down on a device that only you access. When is it okay to charge a personal mobile device using government-furnished equipment (GFE)? **Removable Media in a SCIF What portable electronic devices (PEDs) are allowed in a Sensitive Compartmented Information Facility (SCIF)? Note any identifying information, such as the websites URL, and report the situation to your security POC. Which of the following is a concern when using your Government-issued laptop in public? No, you should only allow mobile code to run from your organization or your organizations trusted sites. Use online sites to confirm or expose potential hoaxes, Follow instructions given only by verified personnel, Investigate the links actual destination using the preview feature, Determine if the software or service is authorized. Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)? We will keep the title; abstract; total price; technology area; organisation; and any related prior submission reference number, detailed in your proposal. Which of the following may help to prevent spillage? Linda encrypts all of the sensitive data on her government issued mobile devices. Digitally signed e-mails are more secure. Then select Submit. Implement Wi-Fi Protected Access 2 (WPA2) Personal encryption at a minimum. the act of publicly documenting and sharing information is called. Identity Management Evidence (Incident): Select all violations at this unattended workstation. Incident #1 a. Note any identifying information and the websites URL. Based on the description that follows, how many potential insider threat indicators(s) are displayed? Use of Government Furnished Equipment (GFE) During Foreign Travel. An experiment consists of tossing three fair (not weighted) coins, except that one of the three coins has a head on both sides. Government Furnished Information Technology (IT) Equipment for Use Physical security of mobile phones carried overseas is not a major issue. endstream endobj 1069 0 obj <>/Metadata 18 0 R/Pages 1066 0 R/StructTreeRoot 22 0 R/Type/Catalog/ViewerPreferences 1083 0 R>> endobj 1070 0 obj <>/MediaBox[0 0 842.04 595.32]/Parent 1066 0 R/Resources<>/Font<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI]>>/Rotate 0/StructParents 0/Tabs/S/Type/Page>> endobj 1071 0 obj <>stream The interim payment plan must provide clearly defined work stages, deliverables with associated payments and timescales. What should Sara do when using publicly available Internet, such as hotel Wi-Fi? How can you protect yourself from social engineering? **Social Engineering Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Which of the following is NOT a potential consequence of using removable media unsafely in a Sensitive Compartmented Information Facility (SCIF)? What is the danger of using public Wi-Fi connections? The billing and coding information in this article is dependent on the coverage indications, limitations and/or medical necessity described in the associated LCD L35490 Category III Codes with the exception of the following CPT codes: 2021 CPT/HCPCS Annual code update: 0295T, 0296T, 0297T, and 0298T deleted. Your password and the second commonly includes a text with a code sent to your phone. correct. CPCON 4 (Low: All Functions) Report the crime to local law enforcement. | cpLo' ;8?NfW\\T| c. Nothing. Which of the following is true about telework? How can you protect data on your mobile computing and portable electronic devices (PEDs)? Select the information on the data sheet that is protected health information (PHI). Immediately notify your security point of contact. Which of the following is true about telework? A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. Not correct Sensitive Compartmented Information (Incident #3): What should the participants in this conversation involving SCI do differently? Which of the following is true of protecting classified data? **Social Engineering Which may be a security issue with compressed Uniform Resource Locators (URLs)? We also use cookies set by other sites to help us deliver content from their services. Adversaries exploit social networking sites to disseminate fake news. Which of the following personally-owned computer peripherals is permitted for use with Government-furnished equipment? Which method would be the BEST way to send this information? Which of the following represents an ethical use of your Government-furnished equipment (GFE)? d. All of these. Which of the following is NOT considered sensitive information? It does not require markings or distribution controls. Which of the following is true of traveling overseas with a mobile phone. **Insider Threat What type of activity or behavior should be reported as a potential insider threat? The long-run aggregate supply curve (LRAS) curve is ______ with a real output level that _____, a) Upward sloping; varies positively with the price level HUj@}qDk. Store classified data appropriately in a GSA-approved vault/container. As long as the document is cleared for public release, you may release it outside of DoD. What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF. Which of the following does NOT constitute spillage? Which of the following is NOT a DoD special requirement for tokens? When using your government-issued laptop in public environments, with which of the following should you be concerned? Classified material must be appropriately marked. No to all: Viewing or downloading pornography, gambling online, conducting a private money-making venture, using unauthorized software, Illegally downloading copyrighted material, making unauthorized configuration changes. You are reviewing your employees annual self evaluation. urpnUTGD. correct. UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. Classification markings and handling caveats. https:// Physical Security: (Incident #2): What should the employee do differently? Photos and videos you are in - Friends Only, Controlled Unclassified Information: (Incident) Which of the following is NOT an example of CUI? Classified information that is accidentally moved to a lower classification or protection level. What should you do? Which is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF). correct. (Sensitive Information) What must the dissemination of information regarding intelligence sources, methods, or activities follow? *Sensitive Compartmented Information Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)? Mobile Devices (Incident): Which of the following demonstrates proper protection of mobile devices? Retrieve classified documents promptly from printers. Unusual interest in classified information. Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. . Assuming open storage is always authorized in a secure facility. Refer the reporter to your organizations public affairs office.
Dunes Golf Club Membership,
77th Infantry Division Wwii Roster,
Best French Bulldog Breeders New Jersey,
Ucla Public Affairs Courses,
Articles P