Avoid attending professional conferences. c. Remove his CAC and lock his workstation. HTKo1[05R4I)RJU=,erh"swJ-k{fo^f^``rf@g]8/u W} @;%m[=jo#UzAk/^)-weH+fX*miP\h6x~0%Agmzw@ 8p2=x"?|ON(K\4n#ikux>mKN|7+>e{yd( 3*aH l+m,t~$ =gP}HN)/xO?y^m\.G!$;\tOE :Q **Removable Media in a SCIF What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? Be aware of classification markings and all handling caveats. Balancesheetaccounts:AssetLiabilityStockholdersEquity:CapitalStockRetainedEarningsDividendsIncomestatementaccounts:RevenueExpenseIncreasCreditCredit(l)DecreaseDebitCreditCreditNormalBalanceDebitCreditCreditDebit. They provide guidance on reasons for and duration of classification of information. The MOD commercial toolkit is accessible on the MOD internet site and contains details on MOD contract conditions. **Mobile Devices Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Note any identifying information, such as the websites URL, and report the situation to your security POC. You believe that you are a victim of identity theft. Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? A coworker is observed using a personal electronic device in an area where their use is prohibited. where there would be significant financial or quality benefits to the work as a result of using GFA). Correct The container prevents malware, intruders, system resources or other applications from interacting with the . Government furnished or purchased equipment or services provided to employees as the result of approved reasonable accommodation requests. Which of the following best describes good physical security? A smartphone that transmits credit card payment information when held in proximity to a credit card reader. Further guidance included in "What DASA does not fund" section. Use the classified network for all work, including unclassified work. What is a valid response when identity theft occurs? Tell us about it through the REPORT button at the bottom of the page. Classified information that should be unclassified and is downgraded. What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF. Permitted Uses of Government-Furnished Equipment (GFE). The CAC/PIV is a controlled item and contains certificates for: An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? a. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Which of the following is NOT a good way to protect your identity? (GFE) When can you check personal e-mail on your Government-furnished equipment (GFE)? What are some potential insider threat indicators? Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? Which of the following best describes good physical security? HTMO@[)4T@c4RIhj{v 0, 1, 2, or 3+. (Spillage) Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? the act of publicly documenting and sharing information is called. spillage definition cyber awareness. \text{Expense}&(l)&\text{Credit}&\text{Debit}\\ (Identity Management) What certificates are contained on the Common Access Card (CAC)? Thats the only way we can improve. Label all files, removable media, and subject headers with appropriate classification markings. What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? Search for instructions on how to preview where the link actually leads. 1304). **Social Networking Which piece if information is safest to include on your social media profile? Which of the following is true of the Common Access Card (CAC)? Explain why. cyber-awareness permission government equipment action answer Under what circumstances is it acceptable to use your Government-furnished computer to check person e-mail asked in Internet by voice (263k points) internet internet-quiz cyber cyber-awareness government computer email personal policy answer On a system of a higher classification level, such as the Secret Internet Protocol Router Network (SIPRNet), On a NIPRNet system while using it for a PKI-required task, What guidance is available for marking Sensitive Compartmented Information (SCI)?A. Using unauthorized software - No **Website Use Which of the following statements is true of cookies? As detailed in the ISC, you must mark your deliverables in accordance with the document marking scheme detailed therein. DASA reserves the right to disclose on a confidential basis any information it receives from you during the procurement process to any third party engaged by DASA for the specific purpose of evaluating or assisting DASA in the evaluation of your proposal. Your DOD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the Non-classified Internet Protocol Router Network (NIPRNet). We reserve the right to exclude a supplier whos been convicted of any of the offences or misconduct listed in the statement relating to good standing that will be sent to you if youre successful under a DASA competition. You will also be required to provide a longer and more detailed abstract that will remain confidential. Of the following, which is NOT a security awareness tip? **Mobile Devices What can help to protect the data on your personal mobile device? What should you do if someone forgets their access badge (physical access)? | cpLo' ;8?NfW\\T| Proactively identify potential threats and formulate holistic mitigation responses. Classified information that should be unclassified and is downgraded. Is this safe? Effective 01/01/2021. GFE consists of: b. What is considered a mobile computing device and therefore shouldnt be plugged in to your Government computer? Personally-owned external monitors may be connected to DoD-issued computers in telework environments via VGA or DVI, but not via USB. (Answer) CPCON 2 (High: Critical and Essential Functions) CPCON 1 (Very High: Critical Functions) CPCON 3 (Medium: Critical, Essential, and Support Functions) CPCON 4 (Low: All Functions) CPCON 5 (Very Low: All Functions). 7bqM8>EM3:N2/YX-4}Y>9> Which of the following actions is appropriate after finding classified Government information on the internet? *Malicious Code What are some examples of malicious code? Illegally downloading copyrighted material - No When operationally necessary, owned by your organization, and approved by the appropriate authority. not correct. Refer the reporter to your organizations public affairs office. More information on DEFCON 705 can be found here. 1082 0 obj <>/Filter/FlateDecode/ID[<6D11769074A68B4F9710B6CBF53B0C2B>]/Index[1068 34]/Info 1067 0 R/Length 76/Prev 82724/Root 1069 0 R/Size 1102/Type/XRef/W[1 2 1]>>stream You receive an inquiry from a reporter about government information not cleared for public release. What is considered ethical use of the Government email system? Which of the following is true of the Common Access Card (CAC)? CUI may be stored only on authorized systems or approved devices. Hk0 Q*Xo(6f/U@cvwrR5dsGw'Wd^4yL)$v6 BZpFC4ir'JvJ%(# Wi/C5*SR-xErYAFh Jr4` '3Pp9iSVH,=#}g()fD-g-xV`p96~cm LI o )^7;y^ Which of the following is a best practice for physical security? Do not access website links in e-mail messages. Enable automatic screen locking after a period of inactivity. Which of the following is NOT a correct way to protect CUI? (Sensitive Compartmented Information) Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)? If you have a product and are looking to become a defence supplier, you may wish to speak to the MOD Defence Suppliers Service. The guidance below will help you to understand who can apply for funding, the sort of projects the Defence and Security Accelerator (DASA) funds, and the terms and conditions of DASA contracts. Understanding and using the available privacy settings. Appropriate confidentiality agreements will be put in place. Only friends should see all biographical data such as where Alex lives and works. Dont worry we wont send you spam or share your email address with anyone. In providing Government Property to a Contractor the Contracting Officer must also make sure that a Contractor is not given an unfair competitive advantage over another Contractor who may not have Government Property. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. a. Physical security of mobile phones carried overseas is not a major issue. **Insider Threat How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? Then select Submit. Aggregating it does not affect its sensitivyty level. You know that this project is classified. You can change your cookie settings at any time. **Insider Threat What type of activity or behavior should be reported as a potential insider threat? *Spillage Which of the following may help prevent inadvertent spillage? What portable electronic devices (PEDs) are permitted in a SCIF? We use some essential cookies to make this website work. A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Select the information on the data sheet that is protected health information (PHI). Which of the following is NOT a home security best practice? endstream endobj 1075 0 obj <>stream 1) Unusual interest in classified information. *Controlled Unclassified Information Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? What level of damage to national security can you reasonably expect Top secret information to cause if disclosed? How can you protect yourself from social engineering? Avoid talking about work outside of the workplace or with people without a need-to-know. Adversaries exploit social networking sites to disseminate fake news. Which of the following is true about telework? *Spillage Which of the following actions is appropriate after finding classified information on the Internet? The general policy is to have the contractor furnish the equipment needed. How can you avoid downloading malicious code? *Spillage A user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. Which of the following is true of Controlled Unclassified Information (CUI)? (Malicious Code) Which of the following is true of Internet hoaxes? Which of the following is true of Security Classification Guides? When examining theories of phobia etiology, this situation would be reflective of ____________ theory. Only connect with the Government VPN. Note any identifying information and the websites Uniform Resource Locator (URL). Classified DVD distribution should be controlled just like any other classified media. **Classified Data Which of the following must you do before using and unclassified laptop and peripherals in a collateral environment? Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. Which of the following does NOT constitute spillage? Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Use online sites to confirm or expose potential hoaxes, Follow instructions given only by verified personnel, Investigate the links actual destination using the preview feature, Determine if the software or service is authorized. IRS employees are permitted to utilize secure Public Wi-Fi access (e.g., hospital, Internet caf, coffee shop, public library). Definition:Government Furnished Property (GFP) is the property in possession ofor acquired by the Government and subsequently furnished to the Contractor for the performance of a contract. (Spillage) What type of activity or behavior should be reported as a potential insider threat? Which is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF). Classified material must be appropriately marked. **Insider Threat How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. Call your security point of contact immediately. How Do I Answer The CISSP Exam Questions? **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? a. a. If authorized, what can be done on a work computer? Since the URL does not start with https, do not provide your credit card information. Which of the following is NOT an example of Personally Identifiable Information (PII)? a. Correct. In most cases there are no nationality restrictions, however DASA individual competition documents will detail any necessary restrictions. Note that all bought-in items will become our property and will be registered as government-furnished assets (GFA). What should you do to protect yourself while on social networks? **Identity Management Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. Which is NOT a wireless security practice? Beware of sudden flashing pop-ups that warn your computer is infected with a virus. Make note of any identifying information and the website URL and report it to your security office. Note That The Integers Should Be Type Cast To Doubles. On a NIPRNet system while using it for a PKI-required taskC. NOT permitted uses of government-furnished equip (GFE) -viewing or downloading pornography -conducting a private gambling online -using unauthorized software -illegal downloading copyrighted materials -making unauthorized configuration changes When is it okay to charge a personal mobile device using government-furnished equipment (GFE) Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approves for access to the NIPRNET. Memory sticks, flash drives, or external hard drives. What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF? You can decide how often to receive updates. When is it okay to charge a personal mobile device using government-furnished equipment (GFE)? *Spillage What is a proper response if spillage occurs? Dont allow other access or to piggyback into secure areas. Which of the following is an example of removable media? You receive an inquiry from a reporter about potentially classified information on the internet. *Sensitive Information What type of unclassified material should always be marked with a special handling caveat? A total of 200 units were produced in Job 413. What is required for an individual to access classified data? Based on the description that follows how many potential insider threat indicators are displayed? Refer the vendor to the appropriate personnel. When using mobile computing devices, including laptops and cell phones, in public: Be careful of information visible on your mobile computing device; consider screen protection Maintain possession of laptop and other government-furnished equipment (GFE) at all times and be extra vigilant in protecting it Protect your mobile computing device *Spillage What should you do when you are working on an unclassified system and receive an email with a classified attachment? Did you earn a Cyber Security Awareness Challenge 2018 Certificate of Completion? Which of the following is NOT a requirement for telework? PII, PHI, and financial information is classified as what type of information? Which of the following does NOT constitute spillage? Phishing can be an email with a hyperlink as bait. **Social Networking Which of the following information is a security risk when posted publicly on your social networking profile? You must have your organization's permission to telework. Select all violations at this unattended workstation. The proper security clearance and indoctrination into the SCI program. correct. c. Report it to security. Validate friend requests through another source before confirming them. Which of the following should be reported as a potential security incident (in accordance with your Agencys insider threat policy)? Verified answer. You should remove and take your CAC/PIV card whenever you leave your workstation. What should the participants in this conversation involving SCI do differently? In your opinion, will there be individual differences? Maybe. There are many travel tips for mobile computing. They can become an attack vector to other devices on your home network. On a computer displaying a notification to update the antivirus softwareB. Which of the following is true of Internet of Things (IoT) devices? Never allow sensitive data on non-Government-issued mobile devices. Which of the following must you do before using an unclassified laptop and peripherals in a collateral classified environment? Report the suspicious behave in accordance with their organization's threat policy. Of the following, which is NOT a method to protect sensitive information? Someone calls from an unknown number and says they are from IT and need some information about your computer. On a computer at the public library to check your DOD email.D. As well as the technical aspects, value for money will also be taken into consideration during the assessment of your proposal. They can be part of a distributed denial-of-service (DDoS) attack. Correct. 3 0 obj The email has an attachment whose name contains the word secret. When may you be subject to criminal, disciplinary, and/or administrative action due to online harassment, bullying, stalking, hazing, discrimination, or retaliation? information generated under previous private venture funding. Which of the following best describes wireless technology? Software that installs itself without the users knowledge, Malicious Code (Damage): How can malicious code cause damage? ( See the table below for guidance. Research the source to evaluate its credibility and reliability. Use the classified network for all work, including unclassified work. **Classified Data Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? Store classified data appropriately in a GSA-approved vault/container. **Home Computer Security What should you consider when using a wireless keyboard with your home computer? 4161.02 Accountability and Management of Government Contract Property, Standard Form 1428 for Inventory Disposal, DFARS Subpart 245.3: Providing Government Property to a Contractor, DoD InstructionDoDI 4161.02 Accountability and Management of Government Contract Property, DFARS PGI 245.103-70 (1) Furnishing Government property to contractors, DoD Roles and Responsibilities of Program Managers for Government Property. Family and relationships - Friends Only Which of the following is a practice that helps to protect you from identity theft? Government Furnished Equipment (GFE) ( FAR Part 45) is equipment that is owned by the government and delivered to or made available to a contractor. Which of the following does not constitute spillage. A Common Access Card and Personal Identification Number. Photos of your pet Correct. You must supply a completed Form 388 and CV for any new research workers. Ensure that the wireless security features are properly configured. **Home Computer Security How can you protect your information when using wireless technology? Ask the individual to see an identification badge. Classified data: (Theory) Which of the following is true of protecting classified data? **Use of GFE What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? Spillage because classified data was moved to a lower classification level system without authorization. What should be your response? What information sources do you think students on your campus use when acquiring dress clothes? All https sites are legitimate. Use a single, complex password for your system and application logons. Mark SCI documents appropriately and use an approved SCI fax machine. You are leaving the building where you work. Government Furnished Equipment: GFE refers to tooling or equipment thats provided to a contractor for use during the project . Spillage: Which of the following does NOT constitute spillage?a. Never write down the PIN for your CAC. Sensitive Compartmented Information GuidesB. *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article.
Underbelly Characters Real Life Tracey Seymour, Todd Energy Inductions, Doubletree Hilton Glasgow Drinks Menu, Project Manager H1b Approval, Kevin Maloney Obituary, Articles P