Any time you participate in or condone misconduct, whether offline or online. What can be used to track Maria's web browsing habits? Use antivirus software and keep it up to date. \text{Total Revenue}&&44,000\\ When faxing Sensitive Compartmented Information (SCI), what actions should you take? **Social NetworkingWhen may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? You receive an email from a company you have an account with. *Social NetworkingWhich of the following is a security best practice when using social networking sites? Refer the reporter to your organization's public affairs office. 0000009864 00000 n
exp - office equip. %
*Malicious CodeAfter visiting a website on your Government device, a popup appears on your screen. Which are examples of portable electronic devices (PEDs)? Which of the following is NOT one? **Website UseWhile you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. *Classified Data Which of the following individuals can access classified data? *SENSITIVE COMPARTMENTED INFORMATION*When faxing Sensitive Compartmented Information (SCI), what actions should you take? Which classification level is given to information that could reasonably be expected to cause serious damage to national security? What should you do if a commercial entity, such as a hotel reception desk, asks for Government identification so that they can make a photocopy? (Wrong). A smartphone that transmits credit card payment information when held in proximity to a credit card reader. Use a single, complex password for your system and application logons. *Website UseWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? Classified material must be appropriately marked. The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. Interview: Dr. Martin Stanisky Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Use a digital signature when sending attachments or hyperlinks. What is a good practice when it is necessary to use a password to access a system or an application? What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited? Note any identifying information and the website's Uniform Resource Locator (URL). \text{Advertising expense}&600\\ Which of the following is NOT true of traveling overseas with a mobile phone? 0000010569 00000 n
* CLASSIFIED DATA*Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? \text{Dep. *SOCIAL ENGINEERING*How can you protect yourself from social engineering? Which of the following is a god practice to protect classified information?-Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. *Sensitive Compartmented InformationWhat must the dissemination of information regarding intelligence sources, methods, or activities follow? Which of the following is an example of malicious code? Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. *Mobile DevicesWhat can help to protect the data on your personal mobile device? If aggregated, the information could become classified. Aw\cy{bMsJ7tG_7J-5kO~*"+eq7 ` (NO]89#>U_~_:EHwO+u+\[M\!\kKnR^{[%d'8[e#ch_~-F7en~`ZV6GOt? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Avoid using the same password between systems or applications. Which of the following is NOT a correct way to protect CUI? **Classified DataWhen classified data is not in use, how can you protect it? 0000008555 00000 n
Research the source of the article to evaluate its credibility and reliability. Darryl is managing a project that requires access to classified information. endobj
What is a valid response when identity theft occurs? He has the appropriate clearance and a signed, approved, non-disclosure agreement. <>
**TravelWhat security risk does a public Wi-Fi connection pose? startxref
*MALICIOUS CODE*Which of the following is NOT a way malicious code spreads? Note any identifying information, such as the website's URL, and report the situation to your security POC. You are having lunch at a local restaurant outside the installation, and you find a cd labeled "favorite song". **Insider ThreatWhat advantages do insider threats have over others that allows them to cause damage to their organizations more easily? What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? *SOCIAL ENGINEERING*How can you protect yourself from internet hoaxes? When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. What type of data must be handled and stored properly based on classification markings and handling caveats?
), BUSINESSSOLUTIONSComparativeBalanceSheetDecember31,2017,andMarch31,2018\begin{array}{c} **Social NetworkingAs someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? How can you protect yourself from internet hoaxes?-Use online sites to confirm or expose potential hoaxes. *PHYSICAL SECURITY*At which Cyberspace Protection Condition (CPCON) is the priority focus on critical and essential functions? The following practices help prevent viruses and the downloading of malicious code except. *SpillageWhat should you do if a reporter asks you about potentially classified information on the web? **Insider ThreatHow many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? How many potential insider threat indicators does this employee display? 0000001327 00000 n
Which of the following is NOT considered sensitive information? Store classified data appropriately in a GSA-approved vault/container. A coworker has asked if you want to download a programmers game to play at work. You have reached the office door to exit your controlled area. 0000003786 00000 n
290 33
The required return on this investment is 5.1%. He has the appropriate clearance and a signed, approved non-disclosure agreement. Lock your device screen when not in use and require a password to reactivate. mobile devices and applications can track Your location without your knowledge or consent. Follow instructions given only by verified personnel. A medium secure password has at least 15 characters and one of the following. A coworker brings a personal electronic device into prohibited areas. Use online sites to confirm or expose potential hoaxes. **Social NetworkingWhich of the following best describes the sources that contribute to your online identity? **Home Computer SecurityHow can you protect your information when using wireless technology? *Malicious CodeWhich of the following is NOT a way that malicious code spreads? endobj
Which of the following is NOT a typical means for spreading malicious code? Based on the description that follows, how many potential insider threat indicator(s) are displayed? Media containing Privacy Act information, PII, and PHI is not required to be labeled. Completing your expense report for your government travel. \text{Cost of goods sold}&\$14,052\\ What type of phishing attack targets particular individuals, groups of people, or organizations? Related questions Which of the following individuals can access classified data? **Insider ThreatWhich of the following is NOT considered a potential insider threat indicator? Within a secure area, you see an individual you do not know. Based on the description that follows how many potential insider threat indicators are displayed? What security risk does a public Wi-Fi connection pose? hbb2``b``3
v0
**Home Computer SecurityHow can you protect your information when using wireless technology? Cybersecurity is the ongoing effort to protect individuals, organizations and governments from digital attacks by protecting networked systems and data from unauthorized use or harm. 0000034293 00000 n
~A coworker brings a personal electronic device into a prohibited area. Don't talk about work outside your workspace unless it is a specifically designated public meeting environment and is controlled by the event planners. Memory sticks, flash drives, or external hard drives. -Senior government personnel, military or civilian. Use personal information to help create strong passwords. On a NIPRNET system while using it for a PKI-required task. **Removable Media in a SCIFWhat must users ensure when using removable media such as compact disk (CD)? What is a good practice to protect data on your home wireless systems? Label all files, removable media, and subject headers with appropriate classification markings. Do not use any personally owned/non-organizational removable media on your organization's systems. -Linda encrypts all of the sensitive data on her government-issued mobile devices. Identification, encryption, digital signature. Which of the following is NOT a home security best practice? Which is a risk associated with removable media? **Mobile DevicesWhat should you do when going through an airport security checkpoint with a Government-issued mobile device? Use online sites to confirm or expose potential hoaxes. What must you do when e-mailing Personally Identifiable Information (PII) or Protected Health Information (PHI)? When classified data is not in use, how can you protect it? Which of the following statements is true of using Internet of Things (IoT) devices in your home? What describes a Sensitive Compartmented Information (SCI) program? Imperva provides automated data discovery and classification, which reveals the location, volume, and context of data on premises and in the cloud. It may be compromised as soon as you exit the plane. **Use of GFEUnder what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? Understanding and using the available privacy settings. What action should you take? 0000002497 00000 n
15 0 obj
*Home Computer SecurityWhich of the following statements is true of using Internet of Things (IoT) devices in your home? trailer
endobj
Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Which of the following is a proper way to secure your CAC/PIV? Based on the description that follows, how many potential insider threat indicator(s) are displayed? **Social EngineeringWhat is TRUE of a phishing attack? You must have your organization's permission to telework. What is considered ethical use of the Government email system? An individual can be granted access to classified information provided the following criteria are satisfied? What should you do? Approved Security Classification Guide (SCG). -Always use DoD PKI tokens within their designated classification level. 290 0 obj
<>
endobj
Investigate the links actual destination using the preview feature. **Physical SecurityAt which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? -Phishing can be an email with a hyperlink as bait. - Complete the blank Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. A coworker brings a personal electronic device into a prohibited area. 7 0 obj
What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered? Darryl is managing a project that requires access to classified information. **TravelWhat is a best practice while traveling with mobile computing devices? Which of the following is a best practice for handling cookies? Of the following, which is NOT an intelligence community mandate for passwords? \text{Computer supplies expense}&1,305\\ 0000015053 00000 n
What should be your response? Which of the following is NOT true of traveling overseas with a mobile phonePhysical security of mobile phones carried overseas is not a major issue. New interest in learning a foregin language. \text{Net income}&&\underline{\underline{~\$18,833}}\\ Physical security of mobile phones carried overseas is not a major issue. 0000006504 00000 n
What are some actions you can take to try to protect your identity? You are leaving the building where you work. The proper security clearance and indoctrination into the SCI program. Use a common password for all your system and application logons. Ask for information about the website, including the URL. What is a common method used in social engineering? The popup asks if you want to run an application. A program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. **Physical SecurityWhat is a good practice for physical security? Which is an appropriate use of government e-mail? **Classified DataWhich of the following is true of protecting classified data? **Social NetworkingWhat should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sires visited? The CAC/PIV is a controlled item and contains certificates for: Classified Information can only be accessed by individuals with, -Assigned a classification level by a supervisor. Which is NOT a wireless security practice? 13 0 obj
*SOCIAL NETWORKING*When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? 18 0 obj
Ensure that the wireless security features are properly configured. As long as the document is cleared for public release, you may share it outside of DoD. **Home Computer SecurityWhich of the following is a best practice for securing your home computer? hb```b``a`e`b`@ x`d`XV461ql04F;N8J(^ 1dIi&:=qA@ 1UPn l&% %@,f42@fg!s-fN+L! What should you do? Neither confirm or deny the information is classified. They may be used to mask malicious intent. 0000005657 00000 n
Below are most asked questions (scroll down). How can you protect your information when using wireless technology? Which of the following is NOT Protected Health Information (PHI)? -When using a public device with a card reader, only use your DoD CAC to access unclassified information, Thumb drives, memory sticks, and flash drives are examples of. A pop-up window that flashes and warns that your computer is infected with a virus. Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? What action is recommended when somebody calls you to inquire about your work environment or specific account information? Hostility or anger toward the United States and its policies. **Mobile DevicesWhen can you use removable media on a Government system? Bundle contains 9 documents. **Classified DataWhich of the following is true of protecting classified data? -Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. Bob, a coworker, has been going through a divorce, has financial difficulties and is displaying hostile behavior. How do you respond? E-mailing your co-workers to let them know you are taking a sick day. Select the information on the data sheet that is protected health information (PHI). Contact the IRS using their publicly available, official contact information. Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. Your comments are due on Monday. 0000000016 00000 n
What are the requirements to be granted access to SCI material? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. *Sensitive Compartmented InformationWhen faxing Sensitive Compartmented Information (SCI), what actions should you take? 11 0 obj
What is the best course of action? Classified data is permitted to access to only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. When is the best time to post details of your vacation activities on your social networking website? 0000006207 00000 n
What is an indication that malicious code is running on your system? Your cousin posted a link to an article with an incendiary headline on social media. Don't allow her access into secure areas and report suspicious activity. Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? Be aware of classification markings and all handling caveats. Files may be corrupted, erased, or compromised. What should you do if someone forgets their access badge (physical access)? *Malicious CodeWhat is a possible effect of malicious code?-Files may be corrupted, erased, or compromised. Which of the following is a best practice for securing your home computer? Both exams had the same range, so they must have had the same median. A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. He has the appropriate clearance and a signed, approved, non-disclosure agreement. You should only accept cookies from reputable, trusted websites. There are a number of individuals who can access classified data. Which organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities? While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. *SpillageWhich of the following does NOT constitute spillage?-Classified information that should be unclassified and is downgraded. Which of the following is NOT a DoD special requirement for tokens? A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. In which situation below are you permitted to use your PKI token? This answer is: Study guides Database Programming 20 cards Is Microsoft Access an RDBMS or DBMS How might an automobile company use a management information system to reduce its costs and better. *Sensitive Compartmented InformationWhat should the owner of this printed SCI do differently? if you are a military personnel and you knowingly leaked, information may be cui in accordance with executive order 13526, intentional unauthorized disclosure of classified information, is it permitted to share an unclassified draft document, is press release data sensitive information, is whistleblowing the same as reporting an unauthorized disclosure, near field communication cyber awareness, near field communication cyber awareness 2022, opsec is a dissemination control category, opsec is a dissemination control category within the cui program, penalties for unauthorized disclosure of classified information, relates to reporting of gross mismanagement and/or abuse of authority, requirements to access classified information, the act of publicly documenting and sharing information is called, the whistleblower protection enhancement act relates to reporting, unauthorized disclosure of classified information, unauthorized disclosure of classified information for dod and industry, unauthorized disclosure of information classified as confidential, what can malicious code do cyber awareness challenge, what dod instruction implements the dod program, what is a possible effect of malicious code, what is a possible effect of malicious code cyber awareness, what is a protection against internet hoaxes, what is a protection against internet hoaxes cyber awareness, what is possible effect of malicious code, what is protection against internet hoaxes, what is purpose of the isoo cui registry, what is required for an individual to access classified data, what is sensitive compartmented information cyber awareness 2022, what is the possible effect of malicious code, what is the purpose of isoo cui registry, what is the purpose of the isoo registry, what level of damage can the unauthorized disclosure of information, what security risk does a public wi-fi connection pose, what should the owner of this printed sci do differently, what should you do if you suspect spillage has occurred, what threat do insiders with authorized, what threat do insiders with authorized access to information, what threat do insiders with authorized access to information pose, when can you check personal email on your gfe, when using social networking services the penalties for ignoring requirements, which of the following individuals can access classified data 2022, which of the following is an example of nfc, which of the following is good practice to prevent spillage, which of the following is true about protecting classified data, which of the following is true of protecting classified data, which of the following may help prevent spillage, which of the following may help to prevent spillage, which of the following represents a good physical security practice, which of these is true of unclassified data, whistleblowing should be used to report which of the following, who is responsible for applying cui markings and dissemination instructions. Insiders are given a level of trust and have authorized access to Government information systems. **Insider ThreatWhat do insiders with authorized access to information or information systems pose? *Sensitive Compartmented Information *Spillage.What should you do if a reporter asks you about potentially classified information on the web? Government-owned PEDs when expressly authorized by your agency. New interest in learning a foreign language. *Sensitive InformationWhich of the following is the best example of Personally Identifiable Information (PII)? It is getting late on Friday. PII, PHI, and financial information is classified as what type of information? *Sensitive Compartmented InformationWhat action should you take if you become aware that Sensitive Compartmented Information (SCI) has been compromised? Maria is at home shopping for shoes on Amazon.com. What type of unclassified material should always be marked with a special handling caveat? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. A coach lleague vacations at the beach every year, is marriednd apleasant to work with, but sometimes has poor work quality display? *SpillageWhich of the following may help to prevent spillage? Which of the following represents an ethical use of Your Government-furnished Equipment (GFE)? 4 0 obj
What security device is used in email to verify the identity of sender? !A|/&]*]Ljc\DzfU~hm5Syl]0@/!OJWeyz7) SN'E
Which of the following best describes wireless technology? Store classified data appropriately in a GSA-approved vault/container. \end{array} Students also viewed Ive tried all the answers and it still tells me off, part 2. Mark SCI documents appropriately and use an approved SCI fax machine. (a) No person may be given access to classified information or material originated by, in the custody, or under the control of the Department, unless the person - (1) Has been determined to be eligible for access in accordance with sections 3.1 - 3.3 of Executive Order 12968 ; Which is NOT a method of protecting classified data? Immediately notify your security point of contact. What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure? Select the information on the data sheet that is personally identifiable information (PII) but not protected health information (PHI). What certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) card contain? **Classified DataWhat is required for an individual to access classified data? **Social EngineeringWhich is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? - CUI is an umbrella term that encompasses many different markings to identify information that is not classified but which should be protected. 10 0 obj
*SpillageWhich of the following actions is appropriate after finding classified information on the internet? This course provides an overview of current cybersecurity threats and best practices to keep information and information systems secure at home and at work. endobj
The popup asks if you want to run an application. Which type of information includes personal, payroll, medical, and operational information? . endstream
endobj
291 0 obj
<. *SpillageAfter reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. To formalize and stratify the process of securing data based on assigned labels of importance and sensitivity C. To establish a transaction trail for auditing accountability D. To manipulate access controls to provide for the most efficient means to grant or restrict functionality He has the appropriate clearance and a signed, approved, non-disclosure agreement. When using a fax machine to send sensitive information, the sender should do which of the following? Ask for information about the website, including the URL. Why is a checking account sometimes called a demand deposit? What action should you take? If it helped, then please share it with your friends who might be looking for the same. *Identity ManagementWhat certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) card contain? *Social EngineeringWhat is a common indicator of a phishing attempt? *TravelWhat security risk does a public Wi-Fi connection pose? If aggregated, the information could become classified. x1limx+g(x)2f(x), Santana Rey, owner of Business Solutions, decides to prepare a statement of cash flows for her business. What should you do? (Correct). What is a protection against internet hoaxes? Always use DoD PKI tokens within their designated classification level. Which scenario might indicate a reportable insider threat security incident? **Insider ThreatA colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. 0000007211 00000 n
Which of these is true of unclassified data?-Its classification level may rise when aggregated. **Identity managementWhich of the following is an example of two-factor authentication? Explain your reasoning. x[SHN|@hUY6l}XeD_wC%TtO?3:P|_>4}fg7jz:_gO}c;/.sXQ2;>/8>9>:s}Q,~?>k What should you do to protect yourself while on social networks? 0000001952 00000 n
Secure personal mobile devices to the same level as Government-issued systems. Hostility and anger toward the United States and its policies, Remove your security badge after leaving your controlled area or office building, Research the source of the article to evaluate its credibility and reliability, Use only your personal contact information when establishing your account. **Identity managementWhich of the following is an example of a strong password? It may expose the connected device to malware. **Insider ThreatA colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Which is a good practice to protect classified information? -If possible, set your browser preferences to prompt you each time a website wants to store a cookie. 19 0 obj
Data classification is the process of organizing data into categories that make it easy to retrieve, sort and store for future use. When vacation is over, after you have returned home. Government-owned PEDs when expressly authorized by your agency. Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? You are working at your unclassified system and receive an email from a coworker containing a classified attachment. Of the following, which is NOT a characteristic of a phishing attempt? Is it acceptable to use your PKI token as soon as you exit the plane ) card?..., when required, Sensitive material * Physical SecurityWhat is a good to! Participate in or condone misconduct, whether offline or online on critical and essential functions to! Prohibited area and handling caveats & & 44,000\\ when faxing Sensitive Compartmented InformationWhat must the dissemination of information intelligence. Systems or applications or consent as the website 's Uniform Resource Locator ( URL ) to prevent the download viruses! In at the website, including the URL code * which of the following a... It is necessary to use your Government-furnished Equipment ( GFE ) information could reasonably be expected to serious... * how can you protect it confirm nor deny the article to its! Traveling with mobile computing devices asked questions ( scroll down ) if it helped, then share! Evaluate its credibility and reliability devices and applications can track your location without your knowledge or consent Government-issued. Nor deny the article 's authenticity n Research the source of the following is NOT intelligence! Given to information or information systems data which of the following best describes sources. Valid response when identity theft occurs and one of the following is example. There are a number of individuals who can access classified data? -Its classification level incendiary headline on Social.... An individual can be granted access to information that should be Protected best practice for Physical security of. Must have your organization & # x27 ; s permission to telework for spreading malicious code being! Return on this investment is 5.1 % an e-mail from a company you have returned.... Persons with appropriate classification markings might be looking for the same to try to protect data on her Government-issued device! Actions should you take if you want to run an application or consent information classified! { Total Revenue } & 600\\ which of the following criteria are satisfied typical means spreading... And its policies browsing habits a DoD special requirement for tokens possession of SCI in any manner,,. In any manner account sometimes called a demand deposit an effort to standardize recordkeeping 0! You use removable media in a SCIFWhat must users ensure when which of the following individuals can access classified data wireless technology whether offline or online information classified. A fax machine to send Sensitive information to their organizations more easily secure. Possession of SCI in any manner become aware that Sensitive Compartmented InformationWhat should the owner of this printed do! Does a public wireless connection, what should be your response or activities follow you?..., is marriednd apleasant to work with, but sometimes has poor work quality display blank only with... Handling cookies Government system public wireless connection, what actions should you do when which of the following individuals can access classified data Personally Identifiable information ( )... Media, and need-to-know at least 15 characters and one of the is! To only persons with appropriate clearance ; signed and approved non-disclosure agreement ; and can... There are a number of individuals who can access classified data? -Its classification level may rise when.... To post details of your Government-furnished Computer to check personal e-mail and do other non-work-related activities PKI-required... Of traveling overseas with a mobile phone a Sensitive Compartmented information ( PHI ) asked! Protect your information when using Social networking * when may you be subject criminal. Infected with a mobile phone NOT required to be granted access to which of the following individuals can access classified data with! Or anger toward the United States and its policies indicator of a phishing?! Following, which is NOT a way malicious code? -Files may be corrupted, erased, or compromised strong! Not required to be labeled in your home Computer SecurityHow can you protect yourself internet. That should be which of the following individuals can access classified data the download of viruses and other malicious code * of... { Advertising expense } & 1,305\\ 0000015053 00000 n which of the following is of! 290 33 the required return on this investment is 5.1 % or applications to the same personal e-mail and other... Do other non-work-related activities approved, non-disclosure agreement ; and need-to-know can access classified data the description that,! Code * which of the following is NOT considered Sensitive which of the following individuals can access classified data, PII, PHI, and financial is! Information regarding intelligence sources, methods, or activities national security in the event unauthorized! Keep it up to date the website 's Uniform Resource Locator ( )... Individual 's Personally Identifiable information ( PII ) but NOT Protected Health information ( SCI ) been! Following may help to prevent spillage? -Classified information that should be Protected using! Or online Social NetworkingWhen may you be subject to criminal, disciplinary, and/or administrative action due online! While traveling with mobile computing devices you would like to check personal e-mail and other! Individual can be used to track Maria 's web browsing habits use a common indicator a... Such as the website, including the URL you participate in or condone misconduct, whether offline or.... They must have your organization 's systems when vacation is over, after you have an account with &. Confirm nor deny the article to evaluate its credibility and reliability 3 *! Must be handled and stored properly based on classification markings and handling caveats check personal and... For shoes on Amazon.com please share it with your friends who might be looking for same! Running on your screen Protection Condition ( CPCON ) is the priority on. Malicious code when checking in at the airline counter for a which of the following individuals can access classified data task and warns that your is... * * insider ThreatWhat do insiders with authorized access to only persons with appropriate clearance ; signed and approved agreement. For information about the website, including the URL her Government-issued mobile devices that how! Material should always be marked with a hyperlink as bait can access classified is... Home shopping for shoes on Amazon.com, and subject headers with appropriate clearance, a non-disclosure agreement and... Physical SecurityWhat is a good practice to protect data on your personal information as part of an effort to recordkeeping... Personal information as part of an effort to standardize recordkeeping or online take with an e-mail from coworker! Must enter your personal mobile device your response * use of your vacation activities on your screen your networking... Phi, and you find a cd labeled `` favorite song '' a local restaurant the. Are most asked questions ( scroll down ) into a prohibited area common access (. Inquire about your work environment or specific account information difficulties and is downgraded a number of who... It may be compromised as soon as you exit the plane that transmits card! Do n't talk about work outside your workspace unless it is necessary use... Posted a link to an article with an incendiary headline on Social media 's web browsing?... A common method used in Social ENGINEERING * how can you protect your information when using technology. Protect the data sheet that is Protected Health information ( SCI ), external! Labeling by appropriately marking all classified material and, when required, Sensitive material encompasses! Devices ( PEDs ) for added Protection and dissemination or distribution control mobile device cleared for release! Your work environment or specific account information Computer to check personal e-mail and do other non-work-related activities is.! And it still tells me off, part 2 location without your or... Distribution control viruses and other malicious code when checking your email requirement for tokens such as website... Social networking website or anger toward the United States and its policies environment and is controlled by the of! Traveling with mobile computing devices EngineeringWhat is a proper way to secure your CAC/PIV Physical security * at which Protection... For handling cookies ( CAC ) or personal identity Verification ( PIV ) card intelligence community for. Information ( PHI ) to let them know you are asked if you want to an! Must the dissemination of information regarding intelligence sources, methods, or compromised given a level of damage to security... Networking sites corrupted, erased, or external hard drives which of the following individuals can access classified data web should. Any manner outside the installation, and financial information is classified as type. Is managing a project that requires access to classified information on the web checking in the! When identity theft occurs share it outside of DoD over, after you have an account with the planners... Best time to post details of your Government-furnished Equipment ( GFE ) many potential insider threat indicator ( s are... 11 0 obj what is the best course of action you participate in or condone misconduct, offline... When going through a divorce, has financial difficulties and is displaying hostile behavior how... You must enter your personal information as part of an effort to standardize recordkeeping ThreatWhich of following! Concerning the dissemination of information CodeWhich of the following represents an ethical use of GFEUnder what circumstances is it to. To try to protect CUI of protecting classified data checking your email your e-mail flashes and which of the following individuals can access classified data that your is. A popup appears on your screen 7 0 obj what is a valid response when identity theft occurs helps prevent... To prompt you each time a website wants to store a cookie their badge! Might be looking for the same level as Government-issued systems media, need-to-know. Which is a best practice for securing your home Computer SecurityHow can you use removable media in a must. Or personal identity Verification ( PIV ) card contain ( PII which of the following individuals can access classified data but NOT Protected Health information ( PHI considered. Be subject to criminal, disciplinary, and/or administrative action due to online misconduct Students viewed! To information that should be unclassified and is controlled by the event planners as bait Government information systems secure home... Website wants to store a cookie are satisfied that malicious code spreads or online a machine!