Which of the following includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? Which of the following attacks target high ranking officials and executives? When operationally necessary, owned by your organization, and approved by the appropriate authority. Select all violations at this unattended workstation. For proposals that we fund, in accordance with the Governments Transparency Agenda, we are required to publish information in respect of Contract documents, comprising: In addition to the above, for proposals that we fund we will publish on DASA website your organisation name and type; DASA reference (ACCxxxxxx) and project title; and contract value. Family and relationships - Friends Only Which of the following is true of traveling overseas with a mobile phone. The email states your account has been compromised and you are invited to click on the link in order to reset your password. yQDx^e|z%HmM4}?>rl\0e_qn;]8sg"pml1d0&wG_-o Fs\Y.>^|]HKTs=tF"l_A{h#: 3^P_h}k (Malicious Code) What is a good practice to protect data on your home wireless systems? **Social Engineering Which may be a security issue with compressed Uniform Resource Locators (URLs)? Store classified data appropriately in a GSA-approved vault/container. Report the suspicious behavior in accordance with their organizations insider threat policy. Contracting officers shall provide property to contractors only when it is clearly demonstrated: That the overall benefit to the acquisition significantly outweighs the increased cost of administration, including ultimate property disposal; That providing the property does not substantially increase the Governments assumption of risk; and. *Spillage Which of the following is a good practice to aid in preventing spillage? endstream endobj 1072 0 obj <>stream You have rejected additional cookies. Classified Information can only be accessed by individuals with. Update now? means youve safely connected to the .gov website. Reviewing and configuring the available security features, including encryption. DOD CYBER AWARENESS. Only use Government-furnished or Government-approved equipment to process PII. Upon connecting your Government- issued laptop to a public wireless connection, what should you immediately do? Right-click the link and select the option to preview??? Be aware of classification markings and all handling caveats. Sensitive Compartmented Information (Incident #3): What should the participants in this conversation involving SCI do differently? Which of the following is NOT a correct way to protect sensitive information? Government-owned PEDs when expressly authorized by your agency. Intellectual Property in the ISC is in most cases managed according to the MOD standard intellectual property contract condition for fully funded research contracts DEFCON 705. A program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. Maybe Cyber Awareness Challenge Complete Questions and Answers Which of the following is NOT a social engineering tip? Taking classified documents from your workspace. Ive tried all the answers and it still tells me off, part 2. Make note of any identifying information and the website URL and report it to your security office. General Services Administration (GSA) approval. Select Yes or No for each item. End of COVID-19 Emergency: Legal Implications for Healthcare Providers You receive an inquiry from a reporter about government information not cleared for public release. (Wrong). Army OPSEC level 1 (Newcomers & Refresher) 29 terms. **Social Networking When is the safest time to post details of your vacation activities on your social networking website? GOVERNMENT-FURNISHED PROPERTY may only use U.S. Forest Service property furnished under this agreement for performing tasks assigned in this agreement. Based on the description that follows, how many potential insider threat indicators(s) are displayed? DOD CYBER AWARENESS Flashcards | Quizlet Which of the following does NOT constitute spillage? Your password and the second commonly includes a text with a code sent to your phone. What should you do? Never use personal e-mail accounts for transmitting PII. Which of the following may help to prevent inadvertent spillage? Always use DoD PKI tokens within their designated classification level. Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Select the information on the data sheet that is protected health information (PHI). Store it in a GSA approved vault or container. Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)? It refers to property used by a contractor during a DoD government contract. What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)? All to Friends Only. Added link to Current Themed Competitions in the Our Standard Contracts section. Adversaries exploit social networking sites to disseminate fake news. Report the suspicious behavior in accordance with their organizations insider threat policy b. Which of the following best describes good physical security? When using mobile computing devices, including laptops and cell phones, in public: Be careful of information visible on your mobile computing device; consider screen protection Maintain possession of laptop and other government-furnished equipment (GFE) at all times and be extra vigilant in protecting it Protect your mobile computing device What should be your response? Only expressly authorized government-owned PEDs. Use only your personal contact information when establishing your account. Social Networking: Select all sections of the profile that contain an issue. **Insider Threat What type of activity or behavior should be reported as a potential insider threat? b. Linda encrypts all of the sensitive data on her government-issued mobile devices. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. How are Trojan horses, worms, and malicious scripts spread? Controlled Unclassified Information: (Incident) Which of the following is NOT a correct way to protect CUI? What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF. endobj We wont pre-fund any expenditure, so interim payment claims mustnt include costs not yet incurred. What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? **Social Engineering Which of the following is a way to protect against social engineering? (GFE) When can you check personal e-mail on your Government-furnished equipment (GFE)? Store it in a shielded sleeve to avoid chip cloning. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. A headset with a microphone through a Universal Serial Bus (USB) port. Classified material must be appropriately marked. (Mobile Devices) When can you use removable media on a Government system? Which of the following is NOT one? https://intranet.hhs.gov/about-hhs/national-security/policy/gfe-foreign-travel-2018. endstream endobj 1075 0 obj <>stream Break-even units equal 2,000. HDMI or DisplayPort may be used if VGA and DVI are unavailable. Use the classified network for all work, including unclassified work. Government Furnished Information Technology (IT) Equipment for Use Follow instructions given only by verified personnel. What is a possible indication of a malicious code attack in progress? Which of the following should be reported as a potential security incident (in accordance with your Agencys insider threat policy)? Then select Submit. All https sites are legitimate. Classified information that should be unclassified and is downgraded. Of the following, which is NOT an intelligence community mandate for passwords? In addition to the guidance on this page you must refer to the relevant competition document for the competition specific terms and conditions, including the specific contract. Travel (Incident): What should Sara do when using publicly available Internet, such as hotel Wi-Fi? 1) Unusual interest in classified information. Use of Government Furnished Equipment (GFE) During Foreign Travel. \text{Capital Stock}&\text{Credit}&&\\ In which situation below are you permitted to use your PKI token? If your organization allows it. What is required for an individual to access classified data? Department Guidance Use of Government Furnished Equipment (GFE) During Foreign Travel. Hes on the clock after all! **Removable Media in a SCIF What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? How should you respond? Tell us about it through the REPORT button at the bottom of the page. c. Alan uses password protection as required on his government-issued smartphone but prefers the ease of no password on his personal smartphone. Which of the following represents an ethical use of your Government-furnished equipment (GFE)? 1304). *Spillage A user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. In addition to avoiding the temptation of greed to betray his country, what should Alex do differently? You have accepted additional cookies. 7bqM8>EM3:N2/YX-4}Y>9> **Physical Security At which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? Hostility or anger toward the United States and its policies. Information should be secured in a cabinet or container while not in use. What describes how Sensitive Compartmented Information is marked? Which of the following is a reportable insider threat activity? What is a valid response when identity theft occurs? Carrying his Social Security Card with him, DoD employees are prohibited from using a DoD CAC in card-reader-enabled public device, Assigned a classification level by a supervisor. Which of the following should you NOT do if you find classified information on the internet? The website requires a credit card for registration. Remove and take it with you whenever you leave your workstation. Store it in a locked desk drawer after working hours. What should you do? Correct. Which of the following best describes good physical security? hbbd``b` $gE@eHLD tk%bUHT 9L,,F|` &1/ All open opportunities are listed on the Apply for Funding page. How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Which of the following is a good practice to protest classified information? When can you check personal e-mail on your Government-furnished Digitally signed e-mails are more secure. A Form 388 will be sent to you if youre successful under a DASA competition. If you participate in or condone it at any time. Security Classification Guides. Secure facilities allow open storage of classified material c Classified material may be used in unsecured areas as long as it remains in the possession of an individual with the proper clearance and need-to-know. Lock your device screen when not in use and require a password to reactivate. Would you like to enable the firewall? It should only be in a system while actively using it for a PKI-required task. It is fair to assume that everyone in the SCIF is properly cleared. What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF? Store your Common Access Card (CAC) or Personal Identity Verification (PIV) card in a shielded sleeve ~Write your password down on a device that only you access (e.g., your smartphone) Change your password at least every 3 months Enable two-factor authentication whenever available, even for personal accounts.

Patrick Collison Wedding, All Inclusive Elopement Packages In Ct, Fresco Play Hands On Solutions, Hsbc Hr Email Address For Reference, How To Remove Epoxy From Quartz Countertop, Articles P