Information should be secured in a cabinet or container while not in use. a. CUI may be stored on any password-protected system b. CUI may be stored in a locked desk after working hours c. CUI may be emailed if encrypted. Use personal information to help create strong passwords. ) A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive car, and has unexplained absences from work. (Insider Threat) Based on the description that follows, how many potential insider threat indicator(s) are displayed? Mark SCI documents appropriately and use an approved SCI fax machine. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Which of the following best describes the conditions under which mobile devices and applications can track your location? **Home Computer Security How can you protect your information when using wireless technology? Implement Wi-Fi Protected Access 2 (WPA2) Personal encryption at a minimum. Correct. Which of the following is a proper way to secure your CAC/PIV? A coworker removes sensitive information without authorization. *Malicious Code After visiting a website on your Government device, a popup appears on your screen. **Identity management Which is NOT a sufficient way to protect your identity? (controlled unclassified information) Which of the following is NOT an example of CUI? If you are concerned your project falls in to one of these categories and are unsure if you should submit a full proposal for a competition please submit a Contact DASA Form which will be checked by a member of our team. What should you do? Which of the following may help to prevent inadvertent spillage? Which of the following is a good practice to avoid email viruses? 1 0 obj Accepting the default privacy settings. Software that installs itself without the user's knowledge. Did you earn a Cyber Security Awareness Challenge 2018 Certificate of Completion? MDM container - An application used to separate and secure NIH data and resources from the rest of the device. Which of the following personally-owned computer peripherals is permitted for use with Government-furnished equipment? Purpose: This instruction memorandum (IM) provides . *Sensitive Information Under what circumstances could classified information be considered a threat to national security? Read more about MOD ethical approval and other regulations which may affect your work. It wont be used for other purposes, without us having obtained the necessary rights and permissions to do so. What is a valid response when identity theft occurs? Youll need to register and then activate your account before you can browse the toolkit. Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI. tell your colleague that it needs to be secured in a cabinet or container. A Form 388 will be sent to you if youre successful under a DASA competition. Delete email from senders you do not know. hb```F3,oFRe@]Xp6)(ndfaP 1Hs30ka`tj l> Which of the following is true of sharing information in a Sensitive Compartmented Information Facility (SCIF)? Always use DoD PKI tokens within their designated classification level. Be aware of classification markings and all handling caveats. 0 How are Trojan horses, worms, and malicious scripts spread? Who designates whether information is classified and its classification level? How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Refer the reporter to your organizations public affairs office. Annual DoD Cyber Awareness Challenge Training, Military Requirements for Petty Officers Thir, EPRC Operator Course JKO (8 hour) Pretest Ans, Elliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson, Operations Management: Sustainability and Supply Chain Management, Anderson's Business Law and the Legal Environment, Comprehensive Volume, David Twomey, Marianne Jennings, Stephanie Greene, John David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine, Chapter 22: Signal Transduction Mechanisms: I, Business Continuation and Succession Planning. Only connect with the Government VPN. Understanding and using the available privacy settings. Office of Management Assessment - NIH Policy Manual Your comments are due on Monday. Right-click the link and select the option to preview??? Calculate the margin of safety in terms of the number of units. Which is NOT a wireless security practice? View email in plain text and dont view email in Preview Pane. Which of the following is NOT an appropriate way to protect against inadvertent spillage? GU,}+ Which of the following attacks target high ranking officials and executives? We expect our suppliers to maintain the highest standards of integrity and professionalism in their business dealings and adhere to the laws of the countries where they operate. **Identity management What is the best way to protect your Common Access Card (CAC)? Correct. *Controlled Unclassified Information Which is a best practice for protecting Controlled Unclassified Information (CUI)? To: All Oregon/Washington Bureau of Land Management Employees. (Malicious Code) Which of the following is NOT a way that malicious code spreads? The following practices help prevent viruses and the downloading of malicious code except. Do not access website links in e-mail messages. Be aware of classification markings and all handling caveats. A coworker has left an unknown CD on your desk. Which of the following is true of the Common Access Card (CAC)? ideas from within Government (excluding Public Sector Research Establishments (PSREs). NB0A 3v(Raz-i*%d^pO0!L'$u(qly/;rg((ob {|Y_1z^oh&d;uE[;W5I_ "j Classified material must be appropriately marked b. In addition to avoiding the temptation of greed to betray his country, what should Alex do differently? *Sensitive Compartmented Information Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)? Government Furnished Equipment: GFE refers to tooling or equipment thats provided to a contractor for use during the project . Notify your security POC b. Analyze the media for viruses or malicious code. CPCON 4 (Low: All Functions) **Social Engineering What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? Use personally-owned wired headsets and microphones only in designated areas, New interest in learning a foreign language. DASA will examine the legal status of organisations prior to placement of any contract. (Spillage) Which of the following is a good practice to aid in preventing spillage? Avoid talking about work outside of the workplace or with people without a need-to-know, Report the suspicious behavior in accordance with their organization's insider threat policy. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. (Spillage) After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. %PDF-1.7 % Further guidance included in "What DASA does not fund" section. **Physical Security What is a good practice for physical security? You must have your organization's permission to telework. DOD Cyber Awareness Challenge 2019- Knowledge Check Based on the description that follows, how many potential insider threat indicator(s) are displayed? In which situation below are you permitted to use your PKI token? Instruction Memorandum No. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. Which of the following is not a best practice to preserve the authenticity of your identity? You can change your cookie settings at any time.
University Of Louisville Track And Field Records,
Monroe County Pistol Permit,
Jasmin And Olivz Nutrition Information,
Robinhood Snacks Shout Out Form,
Fun Places To Eat In Nashville With Music,
Articles P