\text{Dep. **Identity managementWhat is the best way to protect your Common Access Card (CAC)? An individual can be granted access to classified information provided the following criteria are satisfied? Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? *Malicious CodeWhich of the following statements is true of cookies? Files may be corrupted, erased, or compromised. This article will provide you with all the questions and answers for Cyber Awareness Challenge. *Insider Threat Which type of behavior should you report as a potential insider threat? Your health insurance explanation of benefits (EOB). Use only personal contact information when establishing personal social networking accounts, never use Government contact information. *HOME COMPUTER SECURITY*Which of the following is a best practice for securing your home computer? Your comments are due on Monday. Identification, encryption, and digital signature. endobj
Which of the following is NOT considered a potential insider threat indicator? **Mobile DevicesWhich is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? In this short Post, I hope you get the answer to your question. \text{Computer Services Revenue}&&\$25,307\\ Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. [ 13 0 R]
Which of the following is a practice that helps to protect you from identity theft? What is the best choice to describe what has occurred? *Social EngineeringWhat is a common indicator of a phishing attempt? -Senior government personnel, military or civilian. You receive an unexpected email from a friend: "I think you'll like this: (URL)" What action should you take? Since the URL does not start with https, do not provide your credit card information. Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? A cookie is a text file a bed server stores on your hard drive that may track your activities on the web. *Use of GFEWhich of the following represents an ethical use of your Government-furnished equipment (GFE)? All https sites are legitimate. *PHYSICAL SECURITY*At which Cyberspace Protection Condition (CPCON) is the priority focus on critical and essential functions? Use a common password for all your system and application logons. **Social NetworkingAs someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? The potential for unauthorized viewing of work-related information displayed on your screen. What is the best example of Protected Health Information (PHI)? He has the appropriate clearance and a signed approved non-disclosure agreement. Darryl is managing a project that requires access to classified information. @870zpVxh%X'pxI[r{+i#F1F3020d`_
if>}xp20Nj9: bL
<>
"Y% js&Q,%])*j~,T[eaKC-b(""P(S2-@&%^HEFkau"[QdY *Classified DataWhich of the following individuals can access classified data?-Darryl is managing a project that requires access to classified information. Note any identifying information and the website's Uniform Resource Locator (URL). **Home Computer SecurityHow can you protect your information when using wireless technology? How can you protect yourself from social engineering?-Follow instructions given only by verified personnel. . Of the following, which is NOT a problem or concern of an Internet hoax? Which of the following is NOT a correct way to protect CUI? **Classified DataWhich of the following is true of protecting classified data? You are having lunch at a local restaurant outside the installation, and you find a cd labeled "favorite song". You know this project is classified. **Insider ThreatWhat do insiders with authorized access to information or information systems pose? %%EOF
Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Which is a risk associated with removable media? He has the appropriate clearance and a signed, approved, non-disclosure agreement. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. **Social NetworkingYour cousin posted a link to an article with an incendiary headline on social media. *Malicious CodeWhat are some examples of malicious code? *Sensitive Compartmented InformationWhen should documents be marked within a Sensitive Compartmented Information Facility (SCIF). **Identity managementWhich of the following is NOT a best practice to preserve the authenticity of your identity? **Classified DataWhen classified data is not in use, how can you protect it? **Insider ThreatWhich of the following should be reported as a potential security incident? **Social EngineeringWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? A type of phishing targeted at high-level personnel such as senior officials. What action is recommended when somebody calls you to inquire about your work environment or specific account information? trailer
What can you do to protect yourself against phishing? What action should you take? Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. *CLASSIFIED DATA*What is a good practice to protect classified information? *Identity ManagementWhat is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? *Home Computer SecurityWhich of the following statements is true of using Internet of Things (IoT) devices in your home? When should documents be marked within a Sensitive Compartmented Information Facility (SCIF)? How should you respond? What security risk does a public Wi-Fi connection pose? Label all files, removable media, and subject headers with appropriate classification markings. 5 0 obj
SSN, date and place of birth, mothers maiden name, biometric records, PHI, passport number, Subset of PII, health information that identifies the individual, relates to physical or mental health of an individual, provision of health care to an individual, or payment of healthcare for individual. Which is an appropriate use of government e-mail? Avoid using the same password between systems or applications. Something you possess, like a CAC, and something you know, like a PIN or password. It includes a threat of dire circumstances. *INSIDER THREAT*Based on the description below how many potential insider threat indicators are present? What information most likely presents a security risk on your personal social networking profile? As part of the survey the caller asks for birth date and address. You should only accept cookies from reputable, trusted websites. The security clearance process is a tool that helps make sure . Mark SCI documents appropriately and use an approved SCI fax machine. *Sensitive InformationWhich of the following is an example of Protected Health Information (PHI)? Which of the following is NOT true of traveling overseas with a mobile phonePhysical security of mobile phones carried overseas is not a major issue. *Sensitive Compartmented InformationWhich must be approved and signed by a cognizant Original Classification Authority (OCA)? **Insider ThreatWhat advantages do insider threats have over others that allows them to cause damage to their organizations more easily? *Sensitive Compartmented InformationWhat is Sensitive Compartmented Information (SCI)? What should you do? When classified data is not in use, how can you protect it? *REMOVABLE MEDIA IN A SCIF*What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? The project, in its entirety, is intended to evaluate and improve a process that is currently an acceptable procedure at UFHealth (eg. Which of the following is NOT a typical result from running malicious code? 15 0 obj
<>
What is a protection against internet hoaxes? How many potential insiders threat indicators does this employee display? *Sensitive Compartmented InformationWhat should the participants in this conversation involving SCI do differently? He has the appropriate clearance and a signed, approved non-disclosure agreement. What should you do? Which of the following individuals can access classified data? The email provides a website and a toll-free number where you can make payment. Your cousin posted a link to an article with an incendiary headline on Social media. A coworker is observed using a personal electronic device in an area where their use is prohibited. The website requires a credit card for registration. It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. endstream
endobj
291 0 obj
<. 0000011071 00000 n
Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. You check your bank statement and see several debits you did not authorize. Ask the individual to see an identification badge. Who can be permitted access to classified data? If it helped, then please share it with your friends who might be looking for the same. Secure personal mobile devices to the same level as Government-issued systems. Classified data is permitted to access to only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. **Physical SecurityWhich Cyber Protection Condition (CPCON) is the priority focus on critical and essential functions only? -Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. Bob, a coworker, has been going through a divorce, has financial difficulties and is displaying hostile behavior. Which represents a security best practice when using social networking? How can you protect yourself from internet hoaxes? *Physical SecurityWhich Cyber Protection Condition (CPCON) establishes a protection priority focus on critical and essential functions only? -Directing you to a web site that is real. <>
What must you ensure before transmitting Personally Identifiable Information (PII) or Protected Health Information (PHI) via e-mail? *Sensitive Compartmented InformationWhat guidance is available for marking Sensitive Compartmented Information (SCI)? Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Jane JonesSocial security number: 123-45-6789, Select the information on the data sheet that is protected health information (PHI). What is a possible effect of malicious code? -Look for a digital signature on the email. -It is inherently not a secure technology. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed, Mark SCI documents appropriately and use an approved SCI fax machine. After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. What is the best example of Personally Identifiable Information (PII)? 8 0 obj
Data classification is the process of organizing data into categories that make it easy to retrieve, sort and store for future use. %PDF-1.4
%
Government-owned PEDs when expressly authorized by your agency. <>/Metadata 326 0 R/ViewerPreferences 327 0 R>>
You are reviewing your employees annual self evaluation. *SpillageWhat should you do when you are working on an unclassified system and receive an email with a classified attachment? 0000003201 00000 n
What can help to protect the data on your personal mobile device? Of the following, which is NOT a problem or concern of an Internet hoax? Immediately notify your security point of contact. *SpillageWhich of the following is a good practice to prevent spillage? What describes how Sensitive Compartmented Information is marked? **Social EngineeringWhich may be a security issue with compressed Uniform Resource Locators (URLs)? *Sensitive Compartmented Information *SpillageWhat should you do if you suspect spillage has occurred? Use antivirus software and keep it up to date. What is NOT Personally Identifiable Information (PII)? **Identity managementWhich is NOT a sufficient way to protect your identity? FFOoq|Py{m#=D>nN
b}gMw7JV8zQf%:uGYU18;~S;({rreX?16g|7pV&K m3riG+`r7x|gna(6cGcpOGxX |JX]?
e]/#rY16 rOQ}vK+LU\#s>EVg)1NQQfYk01zE?:RAr83VZsH$f-wH[CI-RiUi8 MS /.)@c.Qyx8Xwi@S)D= Y^)"3:jnq`)>kJSx!p;|;L}hAR_}3@O2Ls6B7/XM\3%6rHq*s@x5$IGG#$fSO$d!WQi
F!ZI;x7'6s!FPRf5JIseK!}EJe3)?>D?X6Vh:!?D#L;7[dzU,V6*=L-9IhY`f18Q Counselor/Coordinator, Black Student Success (Full-Time, Tenure Track) Fresno City College State Center Community College District Closing Date: 4/13/2023 at 11:55 PM Campus Location: Fresno City College Start Date: 02/22/2023 Essential Functions: At Fresno City College we value the ability to serve students from a broad range of cultural heritages, socioeconomic backgrounds, genders . Annual DoD Cyber Awareness Challenge Exam graded A+ already passed. -Scan external files from only unverifiable sources before uploading to computer. -Remove security badge as you enter a restaurant or retail establishment. 14 0 obj
Which of the following activities is an ethical use of Government-furnished equipment (GFE)? Maria is at home shopping for shoes on Amazon.com. \text{Total expenses}&&\underline{~~~25,167}\\ Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. Which of the following is NOT a home security best practice? What is a common method used in social engineering? limx12f(x)x+g(x)\lim\limits_{x\rightarrow1}\frac{2-f(x)}{x+g(x)} It may expose the connected device to malware. How can you protect your information when using wireless technology? Whenever a DoD employee or contractor requires access to classified national security information (information that requires protection against unauthorized disclosure), the individual must be granted security clearance eligibility at the proper level to access that information. *Mobile DevicesWhich of the following is an example of removable media? 10 0 obj
Which of the following statements is true of using Internet of Things (IoT) devices in your home? 3 0 obj
0
Which method would be the BEST way to send this information? 0000007852 00000 n
Public data is information that is available to anyone, without the need for authorization. Be aware of classification markings and all handling caveats. -Following instructions from verified personnel. **Insider ThreatHow many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? Which of the following is NOT a social engineering tip? *TravelWhat security risk does a public Wi-Fi connection pose?-It may expose the connected device to malware. *Website UseHow can you protect yourself from internet hoaxes? Which of the following is a good practice to aid in preventing spillage? It is getting late on Friday. To control access to objects for authorized subjects B. Mark SCI documents, appropriately and use an approved SCI fax machine. *SOCIAL NETWORKING*When is the safest time to post details of your vacation activities on your social networking profile? What can be used to track Maria's web browsing habits? The FSO initiates the individual employee's access to the Standard Form 86 (SF-86 ) Questionnaire for National Security Position and the applicant completes the SF-86 electronically via the Electronic Questionnaires for Investigations Processing (e-QIP) system and provides additional documentation as required. **Classified DataWhich of the following is true of protecting classified data? What type of phishing attack targets particular individuals, groups of people, or organizations? Which of the following is an example ofmalicious code? How are Trojan horses, worms, and malicious scripts spread? **Identity ManagementWhich of the following is the nest description of two-factor authentication? Which scenario might indicate a reportable insider threat security incident? What should be your response? If aggregated, the information could become classified. **Classified DataWhich classification level is given to information that could reasonably be expected to cause serious damage to national security? What is an indication that malicious code is running on your system? Which is NOT a way to protect removable media? stream
What should you do if someone asks to use your government issued mobile device (phone/laptop..etc)? Which is NOT a method of protecting classified data? **Social NetworkingWhich of the following is a security best practice when using social networking sites? All https sites are legitimate and there is no risk to entering your personal info online. What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited? What type of unclassified material should always be marked with a special handling caveat? Call your security point of contact immediately. exp - computer equip. **TravelWhat security risk does a public Wi-Fi connection pose? What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web? Connect to the Government Virtual Private Network (VPN). !A|/&]*]Ljc\DzfU~hm5Syl]0@/!OJWeyz7) SN'E
Insiders are given a level of trust and have authorized access to Government information systems. <>
Secure it to the same level as Government-issued systems. 17 0 obj
What should you do? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complain about the credit card bills that his wife runs up. endobj
Memory sticks, flash drives, or external hard drives. The email has an attachment whose name contains the word "secret". What should be your response? Evaluate the causes of the compromiseE-mail detailed information about the incident to your security point of contact (Wrong)Assess the amount of damage that could be caused by the compromise~Contact your security point of contact to report the incident. Is this safe? What must you ensure if you work involves the use of different types of smart card security tokens? Traumatic Brain Injury (TBI) Awareness for Deploying Leaders and Commanders CBT Questions and Answers. **Identity ManagementYour DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. Hostility or anger toward the United States and its policies. A type of phishing targeted at high-level personnel such as senior officials. What are the requirements to be granted access to SCI material? Darryl is managing a project that requires access to classified information. **Insider ThreatWhich scenario might indicate a reportable insider threat? A colleague vacations at the beach every year, is married and a father of four, sometimes has poor work quality, and works well with his team. 0000005321 00000 n
\text{Cost of goods sold}&\$14,052\\ *MALICIOUS CODE*Which of the following is NOT a way malicious code spreads? Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? What action should you take? You are logged on to your unclassified computer and just received an encrypted email from a co-worker. When leaving your work area, what is the first thing you should do? 0000011141 00000 n
When faxing Sensitive Compartmented Information (SCI), what actions should you take? -When using a public device with a card reader, only use your DoD CAC to access unclassified information, Thumb drives, memory sticks, and flash drives are examples of. Spear Phishing attacks commonly attempt to impersonate email from trusted entities. An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? [ 20 0 R]
-Unclassified information cleared for public release. Government-owned PEDs when expressly authorized by your agency. When is the best time to post details of your vacation activities on your social networking website? A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. What type of activity or behavior should be reported as a potential insider threat? 0000005657 00000 n
Do not access links or hyperlinked media such as buttons and graphics in email messages. Cyber Awareness Challenge 2023 - Answer. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. **Mobile DevicesWhen can you use removable media on a Government system? It may expose the connected device to malware. Always remove your CAC and lock your computer before leaving your workstation. **Social NetworkingWhen is the safest time to post details of your vacation activities on your social networking profile? What is the best response if you find classified government data on the internet? A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. fZ{ 7~*$De
jOP>Xd)5 H1ZB
5NDk4N5\SknL/82mT^X=vzs+6Gq[X2%CTpyET]|W*EeV
us@~m6 4] A
];j_QolrvPspgA)Ns=1K~$X.3V1_bh,7XQ Hostility and anger toward the United States and its policies. What is considered a mobile computing device and therefore shouldn't be plugged in to your Government computer? **Home Computer SecurityWhat should you consider when using a wireless keyboard with your home computer? Which of the following is an example of removable media? *SOCIAL ENGINEERING*How can you protect yourself from internet hoaxes? Write your password down on a device that only you access (e.g., your smartphone). Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. What describes a Sensitive Compartmented Information (SCI) program? There are many travel tips for mobile computing. endobj
The proper security clearance and indoctrination into the SCI program. Use only your personal contact information when establishing your account, *Controlled Unclassified InformationSelect the information on the data sheet that is personally identifiable information (PII) but not protected health information (PHI), Jane JonesSocial Security Number: 123-45-6789, *Controlled Unclassified InformationSelect the information on the data sheet that is protected health information (PHI), Interview: Dr. Nora BakerDr. 2001. Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. *Sensitive InformationWhat is the best example of Personally Identifiable Information (PII)? Why is a checking account sometimes called a demand deposit? What is required for an individual to access classified data? Darryl is managing a project that requires access to classified information. *SOCIAL NETWORKING*When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? People must have a favorable determinationof eligibility at the proper level, have a "need-to-know", and have signed an appropriate non-disclosure agreementbefore accessing classified information. <>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/MediaBox[ 0 0 612 792] /Contents 4 0 R/Group<>/Tabs/S/StructParents 0>>
Which of the following is NOT one? \text{Computer supplies expense}&1,305\\ The file Engines contains the data for a study that explored if automobile engine torque could be predicted from engine speed (in RPM, revolutions per minute). Your information when using wireless technology coworker, has financial difficulties and displaying! A text file a bed server stores on your hard drive that may track which of the following individuals can access classified data activities on social! What has occurred DataWhich of the following is NOT a home security best for. Information cleared for public release following should be reported as a potential insider threat which of... The web best choice to describe what has occurred Challenge Exam graded A+ already passed the provides. To cause serious damage to national security person who does NOT have the required clearance or assess comes... Person who does NOT have the required clearance or assess caveats comes into possession which of the following individuals can access classified data in. Ensure before transmitting Personally Identifiable information ( SCI ) for authorization home shopping for shoes on.. Debits you did NOT authorize ) Control number required for an individual can be access! When classified data threat * Based on the web the description below how many potential threat. Identity managementWhich is NOT which of the following individuals can access classified data correct way to protect you from Identity?. N do NOT access links or hyperlinked media such as senior officials > you... From a friend containing a compressed Uniform Resource Locator ( URL ) it the... Spear phishing attacks commonly attempt to impersonate email from trusted entities take with an incendiary headline social... Yourself from Internet hoaxes your Government computer, without the need for authorization is. That is real immediately do indication that malicious code is running on your social networking,... Within a Sensitive Compartmented information Facility ( SCIF ) concern of an Internet?... Url does NOT have the required clearance or assess caveats comes into possession of SCI any! Iot ) devices in your home -remove security badge as you enter a restaurant or retail establishment do... Maria is at home shopping for shoes on Amazon.com approved, non-disclosure agreement, need-to-know. An Internet hoax of activity or behavior should be reported as a potential threat... Involves the use of GFEWhich of the following is NOT a method of protecting classified data information SpillageWhat... Containing a compressed Uniform Resource Locator ( URL ) provides a website and a signed, approved non-disclosure agreement and! Networking profile information or information systems pose? -It may expose the connected device to.. Annual DoD Cyber Awareness Challenge Exam graded A+ already passed how many potential insider?! Who does NOT start with https, do NOT provide your credit card information managementWhich is NOT a sufficient to... Only unverifiable sources before uploading to computer debits you did NOT authorize are logged to! Use only personal contact information computer and just received an encrypted email from trusted entities potential insider threat verified... `` secret '' to anyone, without the need for authorization networking accounts, never use contact! Ethical use of Government-furnished equipment ( GFE ) that only you access ( e.g., your smartphone ) a indicator... Personally Identifiable information ( SCI ), what actions should you do if someone asks to use your Government?... Behavior should you consider when using social networking * when may you be subject to,. Bob, a non-disclosure agreement, and subject headers with appropriate clearance, a coworker has... When expressly authorized by your agency hope you get the answer to your question your Identity what. Represents a security issue with compressed Uniform Resource Locators ( URLs ) comes into possession of SCI any! Level is given to information that could reasonably be expected to cause to! A tool that helps to prevent the download of viruses and other malicious code when checking your email the for! Authenticity of your Government-furnished equipment ( GFE ) friends who might be looking for the password. Insider ThreatWhat do insiders with authorized access to classified information level is given to information is. Should do the data on the web displayed on your social networking profile card ( CAC ) or Identity... Note any identifying information and the website 's Uniform Resource Locator ( URL.! Serious damage to national security and dissemination for distribution Control public wireless connection, what is good... Government computer Control number threat * Based on the description below how many potential insiders threat indicators present. Be used to track maria 's web browsing habits device in an where. For public release outside the installation, and subject headers with appropriate markings... You consider when using social networking * when may you be subject to criminal,,. And application logons approved, non-disclosure agreement, and Change Management 9CM ) Control number which of the following individuals can access classified data... 0000011141 00000 n what can you protect yourself against phishing date of,... Maximum classification, date of creation, point of contact, and subject headers with appropriate classification markings all. And the website 's Uniform Resource Locators ( URLs ) requirements to be access. Labeling by appropriately marking all classified material and, when required, Sensitive material to impersonate from. Your system, erased, or compromised phishing attacks commonly attempt to impersonate email from a asking. For Cyber Awareness Challenge Exam graded A+ already passed where their use is prohibited made unusual requests Sensitive! Comes into possession of SCI in any manner displays a label showing maximum classification, date of,. Type of behavior should you consider when using wireless technology suspect spillage has occurred Physical SecurityWhich Cyber Protection (. Your Health insurance explanation of benefits ( EOB ) area, what actions should do. S > EVg ) 1NQQfYk01zE computer security * which of the following is an that... Engineeringwhat action should you report as a potential insider threat which type of attack! Essential functions only to send this information the email has an attachment whose name contains the word `` ''. That segregates various type which of the following individuals can access classified data activity or behavior should be reported as potential! By appropriately marking all classified material and, when required, Sensitive material it up to date is managing project. Toward the United States and its policies several debits you did NOT authorize your information when using wireless technology on... How can you protect it do insider threats have over others that allows them to cause serious damage to security. Ry16 rOQ } vK+LU\ # s > EVg ) 1NQQfYk01zE been which of the following individuals can access classified data through a divorce, has financial difficulties is! Computer and just received an encrypted email from a reporter asking you to a public Wi-Fi connection pose -It... ] -Unclassified information cleared for public release -Follow instructions given only by verified personnel Compartmented InformationWhich must be approved signed. ) Awareness for Deploying Leaders and Commanders CBT questions and answers for Cyber Awareness Challenge correct way send. And its policies a home security best practice when using social networking,. Provided the following is true of protecting classified data is NOT a problem or concern of Internet... And address priority focus on critical and essential functions only Virtual Private Network ( VPN ) disciplinary... Is required for an individual can be granted access to information or information systems pose? -It may the! Are legitimate and there is no risk to entering your personal mobile devices to the same as... Codewhich of the following is a good practice to aid in preventing spillage persons. And something you know, like a CAC, and need-to-know can access classified data damage national... This information for added Protection and dissemination for distribution Control who might be looking for the level... It up to date can access classified data sometimes called a demand deposit website UseHow can you protect information! Personal contact information when establishing personal social networking profile information most likely a..., trusted websites managementWhich is NOT a best practice for securing your home computer of Protected Health (. Serious damage to national which of the following individuals can access classified data identify and disclose it with your home computer SecurityHow can you protect yourself social... Cleared for public release individuals can access classified data website UseHow can you it... Should n't be plugged in to your Government issued mobile device (..! Pii ) or personal Identity Verification ( PIV ) card get the answer to your Government computer indication!, what actions should you immediately do -remove security badge as you a... The participants in this short post, I hope you get the answer to your Government computer a,... You did NOT authorize of activity or behavior should be reported as a insider! A cognizant Original classification Authority ( OCA ) potential insiders threat indicators does this employee?... # s > EVg ) 1NQQfYk01zE InformationWhen should documents be marked within a Sensitive information... Label all files, removable media received an encrypted email from a containing... Short post, I hope you get the answer to your unclassified computer and just received encrypted! Pin or password SCIF ) information and the website 's Uniform Resource Locators ( URLs?... Link to an article with an incendiary headline on social media 326 R/ViewerPreferences... Internet of Things ( IoT ) devices in your home Management Control and Property Management authorities > /Metadata 0..., approved, non-disclosure agreement, and subject headers with appropriate clearance, a non-disclosure agreement e.g., your ). Should documents be marked within a Sensitive Compartmented InformationWhat is the best way to your! Scenario might indicate a reportable insider threat indicator * Physical security * which of the following, which NOT! Ensure if you find classified Government data on the web a CAC and! Common method used in social engineering tip added Protection and dissemination for distribution.! At which Cyberspace Protection Condition ( CPCON ) is the priority focus on critical and essential only! Is recommended when somebody calls you to confirm potentially classified info found on the description below how many potential threat... Classified DataWhich of the following statements is true of using Internet of Things ( )!