A colleague enjoys playing video games online, regularly use social media, and frequently forgets to secure her smartphone elsewhere before entering areas where it is prohibited. Which is NOT a method of protecting classified data? b. taking away a toy or treat Cyber Awareness 2022. Which of the following does NOT constitute spillage? Correct. The following practices help prevent viruses and the downloading of malicious code except. Call your security point of contact immediately. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Which Of The Following Statements About Adding Social Networks To Hootsuite Is False? correct. Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? Let us know if this was helpful. What information most likely presents a security risk on your personal social networking profile? Retrieve classified documents promptly from printers. What is the best response if you find classified government data on the internet? The Chinese Spy Balloon Showdown The discovery of a Chinese surveillance balloon floating over the United States has added to the rising tensions between the two superpowers. Ensure proper labeling by appropriately marking all classified material. How Do I Answer The CISSP Exam Questions? The age of the driver may top the list of variables. Which of the following is NOT a correct way to protect sensitive information? Which of the following definitions is true about disclosure of confidential information? Decline So That You Maintain Physical Control of Your Government-Issued Laptop. A coworker removes sensitive information without authorization. correct. Connect and share knowledge within a single location that is structured and easy to search. Which of the following individuals can access classified data? Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? Correct. What information most likely presents a security risk on your personal social networking profile? Which of the following is true of the Common Access Card (CAC)? Be aware of classification markings and all handling caveats. What is a best practice for protecting controlled unclassified information (CUI)? Report the suspicious behavior in accordance with their organizations insider threat policy. Only allow mobile code to run from your organization or your organizations trusted sites. Access requires a formal need-to-know determination issued by the Director of National Intelligence.? Immediately notify your security point of contact. Ctrl+F (Cmd+F) will help you a lot when searching through such a large set of questions. *Sensitive Compartmented Information When is it appropriate to have your security badge visible? Which of the following is NOT a security best practice when saving cookies to a hard drive? *Spillage .What should you do if a reporter asks you about potentially classified information on the web? **Insider Threat Which of the following is NOT considered a potential insider threat indicator? CPCON 4 (Low: All Functions) **Classified Data What is required for an individual to access classified data? Which of these is true of unclassified data? In the following situations, determine if the duty describes would be one of the Fed is responsible or is not responsible to enforce. You can email your employees information to yourself so you can work on it this weekend and go home now. You can't have 1.9 children in a family (despite what the census might say ). Report the crime to local law enforcement. You receive an inquiry from a reporter about potentially classified information on the internet. Search for an answer or ask Weegy. When expanded it provides a list of search options that will switch the search inputs to match the current selection. Your favorite movie. We thoroughly check each answer to a question to provide you with the most correct answers. Which of the following does not constitute spillage. The challenges goal is simple: To change user behavior to reduce the risks and vulnerabilities DoD Information Systems face. Which of the following is a practice that helps to protect you from identity theft? This answer has been confirmed as correct and helpful. What security device is used in email to verify the identity of sender? which of the following is true about unclassified data. **Insider Threat How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? Which piece of information is safest to include on your social media profile? Which of the following demonstrates proper protection of mobile devices? Some examplesyou may be familiar with: TheFederalCUI Registry,shows authorized categoriesandassociated markings, as well as applicable safeguarding, dissemination, and decontrol procedures. *Sensitive Compartmented Information What is Sensitive Compartmented Information (SCI)? It never requires classified markings, it is true about unclassified data. CUI may be stored on any password-protected system. Preventing an authorized reader of an object from deleting that object B. (2) War planning documents which contain worldwide -- (a) Planning data and assumptions, (b) Wartime planning factors for the use of nuclear weapons, (c) Intelligence estimates of enemy capabilities, (d) Force composition and development, and Media containing Privacy Act information, PII, and PHI is not required to be labeled. ALways mark classified information appropriately and retrieve classified documents promptly from the printer. DoD Unclassified data: Must be cleared before being released to the public May require applci aton i of Controled l Uncasl sed Iifi nformaton i (CU)I access and distribution controls Must be clearly marked as Unclassified or CUI if included in a classified document or classified storage area While it may seem safer, you should NOT use a classified network for unclassified work. What type of security is part of your responsibility and placed above all else?, If your wireless device is improperly configured someone could gain control of the device? Store it in a GSA approved vault or container. By Quizzma Team / Technology. Store it in a locked desk drawer after working hours. What action should you take? Which of the following is a good practice to prevent spillage? **Website Use While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. *Sensitive Compartmented Information Which must be approved and signed by a cognizant Original Classification Authority (OCA)? 4. A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. Note any identifying information, such as the websites URL, and report the situation to your security POC. Dont allow other access or to piggyback into secure areas. What can be used to track Marias web browsing habits? CUI must be handled using safeguarding or dissemination controls. When using a fax machine to send sensitive information, the sender should do which of the following? Is it permitted to share an unclassified draft document with a non-DoD professional discussion group? the following is true about unclassified data fy23 controlled unclassified information cui quizlet what is true of controlled unclassified information What. You know this project is classified. Of the following, which is NOT a problem or concern of an Internet hoax? Malicious code can do damage by corrupting files, erasing your hard drive, and/or allowing hackers access. It may be compromised as soon as you exit the plane. As a best practice, labeling all classified removable media and considering all unlabeled removable media as unclassified. How many potential insiders threat indicators does this employee display? A Software that installs itself without the users knowledge. A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. asked in Internet by voice (265k points) Question : Which of the following is true about unclassified data? When unclassified data is aggregated, its classification level may rise. cyber-awareness. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. Understanding and using the available privacy settings. Social Security Number; date and place of birth; mothers maiden name. How should you respond? Which of the following is true of Unclassified information? ~A coworker brings a personal electronic device into a prohibited area. Based on the description that follows, how many potential insider threat indicator(s) are displayed? How can you protect data on your mobile computing and portable electronic devices (PEDs)? Many apps and smart devices collect and share your personal information and contribute to your online identity. Which of the following is a good practice for telework? (Spillage) Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? A man you do not know is trying to look at your Government-issued phone and has asked to use it. (Sensitive Information) What certificates are contained on the Common Access Card (CAC)? Only friends should see all biographical data such as where Alex lives and works. **Home Computer Security What should you consider when using a wireless keyboard with your home computer? -It never requires classification markings. Which of the following is NOT a social engineering tip? How many potential insider threat indicators does this employee display? What is required for an individual to access classified data? Leaked classified or controlled information is still classified/controlled even if it has already been compromised. *Classified Data After you have returned home following the vacation. Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)? A coworker removes sensitive information without approval. Reviewing and configuring the available security features, including encryption. The following table lists the number of drivers in the United States, the number of fatal accidents, and the number of total accidents in each age group in 2002. February 8, 2022. **Classified Data How should you protect a printed classified document when it is not in use? Do not access website links in e-mail messages. The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. Paul verifies that the information is CUI, includes a CUI marking in the subject header and digitally signs an e-mail containing CUI. A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. Which of the following should you do immediately? A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up.