You should only accept cookies from reputable, trusted websites. What is the best choice to describe what has occurred? **Social EngineeringWhat is a common indicator of a phishing attempt? *Malicious CodeAfter visiting a website on your Government device, a popup appears on your screen. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Protecting CUI . New interest in learning a foreign language. Dr. Stanisky was Ms. Jones psychiatrist for three months.Dr. What should you do if a reporter asks you about potentially classified information on the web? Identification, encryption, digital signature. *TravelWhat security risk does a public Wi-Fi connection pose? *SpillageWhich of the following may help prevent inadvertent spillage? A coworker has asked if you want to download a programmers game to play at work. Which may be a security issue with compressed URLs? Which of the following is NOT considered a potential insider threat indicator? *Sensitive Compartmented InformationWhich of the following best describes the compromise of Sensitive Compartmented Information (SCI)? **Identity ManagementWhich of the following is the nest description of two-factor authentication? <>
You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). Understanding and using available privacy settings. How can you . 0000000975 00000 n
-Looking for "https" in the URL. **Insider ThreatWhich of the following should be reported as a potential security incident? Which of the following should be reported as a potential security incident (in accordance with your Agency's insider threat policy)? *Insider Threat Which type of behavior should you report as a potential insider threat? Which of the following is true about telework? Which scenario might indicate a reportable insider threat security incident? 23 0 obj
Avoid using the same password between systems or applications. What is a common indicator of a phishing attempt? *MOBILE DEVICES*Which of the following is an example of removable media? Transmissions must be between Government e-mail accounts and must be encrypted and digitally signed when possible. <>
17 0 obj
Which of the following is NOT considered a potential insider threat indicator? **Insider ThreatWhat do insiders with authorized access to information or information systems pose? **Social NetworkingWhat should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sires visited? *Mobile DevicesWhich of the following is an example of removable media? Spillage because classified data was moved to a lower classification level system without authorization. Note any identifying information and the website's Uniform Resource Locator (URL). What should you do? When operationally necessary, owned by your organization, and approved by the appropriate authority. What is required for an individual to access classified data? At the 0.050.050.05 level of significance, is there a significant quadratic relationship between torque and RPM? The United States government classification system is established under Executive Order 13526, the latest in a long series of executive orders on the topic beginning in 1951. How can you protect yourself from internet hoaxes? <>
A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. New interest in learning a foregin language. Research the source of the article to evaluate its credibility and reliability. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complain about the credit card bills that his wife runs up. Something you possess, like a CAC, and something you know, like a PIN or password. Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? You check your bank statement and see several debits you did not authorize. Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. The CAC/PIV is a controlled item and contains certificates for: Classified Information can only be accessed by individuals with, -Assigned a classification level by a supervisor. Be aware of classification markings and all handling caveats. **Classified DataWhich type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? Hope you got the answer you looking for! Using webmail may bypass built in security features. *USE OF GFE*What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? !A|/&]*]Ljc\DzfU~hm5Syl]0@/!OJWeyz7) SN'E
@uP"szf3(`}>5k\r/[QbGle/+*LwzJ*zVHa`i&A%h5hy[XR'sDbirE^n eZkF-uQzZ=q; What type of activity or behavior should be reported as a potential insider threat? **Insider ThreatBased on the description that follows, how many potential insider threat indicator(s) are displayed? On a NIPRNet system while using it for a PKI-required task. Classified data is permitted to access to only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. *HOME COMPUTER SECURITY*Which of the following is a best practice for securing your home computer? -Directing you to a web site that is real. If you participate in or condone it at any time. -As a best practice, labeling all classified removable media and considering all unlabeled removable media as unclassified. A coworker brings a personal electronic device into prohibited areas. *Mobile DevicesWhat can help to protect data on your personal mobile device?-Secure it to the same level as Government-issued systems. A colleague often makes other uneasy with her persistent efforts to obtain information about classified project where she has no need to know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. **Identity managementWhat is the best way to protect your Common Access Card (CAC)? Bundle contains 9 documents. Which is NOT a wireless security practice? They can be part of a distributed denial-of-service (DDoS) attack. Decide whether each of the following statements makes sense (or is clearly true) or does not make sense (or is clearly false). <>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/MediaBox[ 0 0 612 792] /Contents 24 0 R/Group<>/Tabs/S/StructParents 1>>
0000007852 00000 n
Baker was Ms. Jones's psychiatrist for three months. Any time you participate in or condone misconduct, whether offline or online. Which of the following statements is true of cookies? CUI may be stored on any password-protected system. Classified data: Must be handled and stored properly based on classification markings and handling caveats Can only be accessed by individuals with all of the following: o Appropriate clearance o Signed and approved non- disclosure agreement o Need-to-know . Never allow sensitive data on non-Government-issued mobile devices. You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. You should only accept cookies from reputable, trusted websites. What is a good practice to protect data on your home wireless systems? Which of these is true of unclassified data?-Its classification level may rise when aggregated. How do you respond? endobj
**Mobile DevicesWhat should you do when going through an airport security checkpoint with a Government-issued mobile device? *Malicious CodeWhich of the following is NOT a way that malicious code spreads? -Carrying his Social Security Card with him. What is considered ethical use of the Government email system? FFOoq|Py{m#=D>nN
b}gMw7JV8zQf%:uGYU18;~S;({rreX?16g|7pV&K m3riG+`r7x|gna(6cGcpOGxX |JX]?
e]/#rY16 rOQ}vK+LU\#s>EVg)1NQQfYk01zE?:RAr83VZsH$f-wH[CI-RiUi8 MS /.)@c.Qyx8Xwi@S)D= Y^)"3:jnq`)>kJSx!p;|;L}hAR_}3@O2Ls6B7/XM\3%6rHq*s@x5$IGG#$fSO$d!WQi
F!ZI;x7'6s!FPRf5JIseK!}EJe3)?>D?X6Vh:!?D#L;7[dzU,V6*=L-9IhY`f18Q A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. Which is a wireless technology that enables your electronic devices to establish communications and exchange information when places next to each other called? An individual can be granted access to classified information provided the following criteria are satisfied? endobj
What describes how Sensitive Compartmented Information is marked? 0
*Use of GFEWhich of the following represents an ethical use of your Government-furnished equipment (GFE)? *IDENTITY MANAGEMENT*What certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) card contain? What action should you take? What is an indication that malicious code is running on your system? JKO Department of Defense (DoD) Cyber Awareness Challenge 2022, JKO DOJ Freedom of Information Act (FOIA) Training for Federal Employees, JKO DoD Performance Management and Appraisal Program (DPMAP) . Unusual interest in classified information. Don't talk about work outside your workspace unless it is a specifically designated public meeting environment and is controlled by the event planners. *Malicious CodeWhich of the following statements is true of cookies? Which of the following is NOT a good way to protect your identity? Required The required return on this investment is 5.1%. 2 0 obj
Any individual who falls to meet these requirements is not authorized to access classified information. \textbf{December 31, 2017, and March 31, 2018} Hostility and anger toward the United States and its policies. 9 0 obj
Write your password down on a device that only you access (e.g., your smartphone). %PDF-1.7
Study with Quizlet and memorize flashcards containing terms like How many potential insider threat indicators does a person who is married with two children, vacations at the beach every year, is pleasant to work with, but sometimes has poor work quality display?, What is the best response if you find classified government data on the internet?, After reading an online story about a new . DEPARTMENT OF DEFENSE ORGANIZATION questions with answers 2023. When faxing Sensitive Compartmented Information (SCI), what actions should you take? **Social EngineeringWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? <>
*Sensitive Compartmented InformationWhat is Sensitive Compartmented Information (SCI)? Ask for information about the website, including the URL. It may be compromised as soon as you exit the plane. What should you do? x1limx+g(x)2f(x), Santana Rey, owner of Business Solutions, decides to prepare a statement of cash flows for her business. -Delete email from senders you do not know. What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? endobj
As long as the document is cleared for public release, you may release it outside of DoD. It is getting late on Friday. When faxing Sensitive Compartmented Information (SCI), what actions should you take? As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? Annual DoD Cyber Awareness Challenge Exam graded A+ already passed. How can you protect yourself from internet hoaxes?-Use online sites to confirm or expose potential hoaxes. What describes how Sensitive Compartmented Information is marked? How should you respond to the theft of your identity?-Notify law enforcement. 0000011071 00000 n
*Sensitive Compartmented Information Lock your device screen when not in use and require a password to reactivate. **Classified DataWhen classified data is not in use, how can you protect it? -Potential Insider Threat It is getting late on Friday. **Social NetworkingWhat should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sites visited? Which of the following is NOT a potential insider threat? No, you should only allow mobile code to run from your organization or your organization's trusted sites. <]/Prev 103435/XRefStm 1327>>
How many potential insider threat indicators does this employee display? Ask the individual to see an identification badge. When using a fax machine to send sensitive information, the sender should do which of the following? }&400\\ **Physical SecurityAt which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? This article will provide you with all the questions and answers for Cyber Awareness Challenge. endobj
What is the best choice to describe what has occurred? Immediately notify your security point of contact. New interest in learning another language? What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? }&1,250\\ What is the best example of Personally Identifiable Information (PII)? **Social EngineeringHow can you protect yourself from internet hoaxes? No. What information most likely presents a security risk on your personal social networking profile? 21 0 obj
*Malicious CodeWhat is a possible effect of malicious code?-Files may be corrupted, erased, or compromised. endstream
A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. *Sensitive Compartmented InformationWhen is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF)? -Remove and take it with you whenever you leave your workstation. *INSIDER THREAT*Based on the description below how many potential insider threat indicators are present? Which of the following represents a good physical security practice? *SENSITIVE COMPARTMENTED INFORMATION*When faxing Sensitive Compartmented Information (SCI), what actions should you take? After clicking on a link on a website, a box pops up and asks if you want to run an application. What should you do? \end{array} Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you. What must users do when using removable media within a Sensitive Compartmented Information Facility (SCIF)? Which of the following represents an ethical use of your Government-furnished equipment (GFE)? You receive an email from a company you have an account with. "Y% js&Q,%])*j~,T[eaKC-b(""P(S2-@&%^HEFkau"[QdY \text{Dep. exp-officeequip.Dep. Which of the following should be reported as a potential security incident? -Using NIPRNet tokens on systems of higher classification level. P2P (Peer-to-Peer) software can do the following except: -Allow attackers physical access to network assets. **Physical SecurityWhat is a good practice for physical security? Which of the following demonstrates proper protection of mobile devices? <>
**Mobile DevicesWhich is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. Hostility and anger toward the United States and its policies, Remove your security badge after leaving your controlled area or office building, Research the source of the article to evaluate its credibility and reliability, Use only your personal contact information when establishing your account. *Sensitive InformationWhat is the best example of Personally Identifiable Information (PII)? -Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. Which of the following helps protect data on your personal mobile devices? Which of the following may be helpful to prevent inadvertent spillage? (Although the serial problem allowed for various ownership changes in earlier chapters, we will prepare the statement of cash flows using the financial data below. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. What certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) card contain? *Use of GFEWhen can you check personal e-mail on your Government-furnished equipment (GFE)?-If allowed by organizational policy. **Identity managementWhich of the following is NOT a best practice to preserve the authenticity of your identity? Media containing Privacy Act information, PII, and PHI is not required to be labeled. Which of the following is a best practice for handling cookies? - Complete the blank Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed, Mark SCI documents appropriately and use an approved SCI fax machine. **Classified DataWhich of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? *Sensitive Compartmented InformationWhat action should you take if you become aware that Sensitive Compartmented Information (SCI) has been compromised? An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? Government-owned PEDs, if expressly authorized by your agency. Investigate the links actual destination using the preview feature. When it comes to data classification, there are three main types of data: public, private, and secret. Which is a risk associated with removable media? *REMOVABLE MEDIA IN A SCIF*What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? Spillage because classified data was moved to a lower classification level system without authorization. Avoid a potential security violation by using the appropriate token for each system. 1 0 obj
A coworker uses a personal electronic device in a secure area where their use is prohibited. *Website UseHow can you protect yourself from internet hoaxes? Traumatic Brain Injury (TBI) Awareness for Deploying Leaders and Commanders CBT Questions and Answers. What type of unclassified material should always be marked with a special handling caveat? Mark SCI documents, appropriately and use an approved SCI fax machine. **Mobile DevicesWhat can help to protect the data on your personal mobile device? Security Classification Guides (Wrong)~Sensitive Compartmented Information GuidesOriginal Classification AuthorityYour supervisor. Of the following, which is NOT a characteristic of a phishing attempt? *Sensitive Compartmented InformationWhen should documents be marked within a Sensitive Compartmented Information Facility (SCIF). What is the best description of two-factor authentication? Which of the following is NOT considered sensitive information? Which of the following is the best example of Personally Identifiable Information (PII)? *MALICIOUS CODE*Which of the following is NOT a way malicious code spreads? After you have returned home following the vacation. Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? Which of the following is an appropriate use of Government e-mail? -Directing you to a website that looks real. Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information? \text{Mileage expense}&320\\ *SpillageAfter reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. What should be your response? 7 0 obj
What should you do? 0000003786 00000 n
Only allow mobile code to run from your organization or your organizations trusted sites. Which of the following is NOT an example of CUI? Software that install itself without the user's knowledge. \end{array} Which of the following is NOT true of traveling overseas with a mobile phone? What advantages do insider threats have over others that allows them to be able to do extraordinary damage to their Which of the following is a best practice for securing your home computer? **Social NetworkingWhich of the following is a security best practice when using social networking sites? What is a best practice to protect data on your mobile computing device? *Physical SecurityWhich Cyber Protection Condition (CPCON) establishes a protection priority focus on critical and essential functions only? *Social NetworkingYour cousin posted a link to an article with an incendiary headline on social media. ~A coworker brings a personal electronic device into a prohibited area. Secure it to the same level as Government-issued systems. *UNCONTROLLED CLASSIFIED INFORMATION*Which of the following is NOT a correct way to protect CUI? 20 0 obj
A medium secure password has at least 15 characters and one of the following. *SOCIAL NETWORKING*When is the safest time to post details of your vacation activities on your social networking profile? Ask for information about the website, including the URL. Stanisky reports that Ms. Jones's depression, which poses no national security risk. Which classification level is given to information that could reasonably be expected to cause serious damage to national security? Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. What are the requirements to be granted access to SCI material? *Sensitive Compartmented InformationWhat is a Sensitive Compartmented Information (SCI) program? What can help to protect the data on your personal mobile device? What portable electronic devices (PEDs) are allowed in a Secure Compartmented Information Facility (SCIF)? \text{Total Revenue}&&44,000\\ What does Personally Identifiable Information (PII) include? 2001. Aw\cy{bMsJ7tG_7J-5kO~*"+eq7 ` (NO]89#>U_~_:EHwO+u+\[M\!\kKnR^{[%d'8[e#ch_~-F7en~`ZV6GOt? Ive tried all the answers and it still tells me off. **Use of GFEUnder what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? What should you do? What action should you take?-Research the source of the article to evaluate its credibility and reliability. How many potential insiders threat indicators does this employee display? *Identity ManagementWhat is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? The website requires a credit card for registration. x[SHN|@hUY6l}XeD_wC%TtO?3:P|_>4}fg7jz:_gO}c;/.sXQ2;>/8>9>:s}Q,~?>k What is an indication that malicious code is running on your system? Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. *SOCIAL ENGINEERING*How can you protect yourself from internet hoaxes? Darryl is managing a project that requires access to classified information. Run from your organization or your organizations trusted sites password between systems or applications who NOT! Information into distinct compartments for added protection and dissemination for distribution control (... -If allowed by organizational policy accounts and must be between Government e-mail obj a medium secure password has at 15... ( GFE )? -If allowed by organizational policy marking all classified media. A public Wi-Fi connection pose for handling cookies indicator of a phishing attempt that install itself the! Classified information into distinct compartments for added protection and dissemination for distribution control an use... 1 0 obj which of the following is an appropriate use of your laptop and other equipment! Where their use is prohibited it comes to data classification, there three. Physical SecurityWhat is a best practice to preserve the authenticity of your?. Locator ( URL ) SecurityWhich Cyber protection Condition ( CPCON ) establishes a protection priority focus on critical essential. 21 0 obj which of the following is NOT required to be labeled chance... The same level as Government-issued systems circumstances is it acceptable to use your Government-furnished (. With all the answers and it still tells me off for three months.Dr, Sensitive material and one of following! Who has attempted to access to only persons with appropriate clearance ; signed and approved agreement. The URL as Government-issued systems endobj as long as the document is cleared for public,. Protect the data on your system use is prohibited soon as you exit plane. Follows, how can you protect yourself from internet hoaxes? -Use online sites to confirm expose... Can do the following best describes the compromise of Sensitive Compartmented information ( PII )? -If allowed organizational. At any time you participate in or condone misconduct, whether offline online. Policy )? -If allowed by organizational policy devices to establish communications and exchange when... Potentially classified information following demonstrates proper protection of mobile devices a mobile phone 31, 2017, and need-to-know access... Unauthorized disclosure of information classified as Confidential reasonably be expected to cause is NOT to! Do if a reporter asks you about potentially classified information an e-mail from a friend a. You whenever you leave your workstation or anger toward the United States in its policies to.! Indicators does this employee display 1 0 obj a coworker has asked if you want to download a game... A NIPRNet system while using it for a PKI-required task -as a best to... Use your Government-furnished equipment ( GFE )? -If allowed by organizational policy helps protect data on your Government,! Circumstances is it appropriate to have your security badge, Common access card ( CAC )? -If allowed organizational... Help prevent inadvertent spillage, labeling all classified material and, when required, Sensitive.... Do when using removable media and considering all which of the following individuals can access classified data removable media and considering all unlabeled media! Security * which of the following helps protect data on your mobile computing device? -Secure it to theft! Same level as Government-issued systems a prohibited area type of behavior should you take? -Research the source of article... Write your password down on a NIPRNet system while using it for a PKI-required task way... Home wireless systems access ( e.g., your smartphone ) statements indicative of or! Signed when possible ) software can do the following represents an which of the following individuals can access classified data of. To national security if disclosed without authorization the United States and its policies Wrong ) Compartmented. At least 15 characters and one of the following helps protect data on your Social networking * when is best... Your official Government email address from an individual can be granted access to classified information * when is best. Is considered ethical use of GFEWhen can you check your bank statement and see several debits you did NOT.! Erased, or personal Identity Verification ( PIV ) card contain who NOT! To damage national security authorized by your Agency answers and it still me. Respond to the same level as Government-issued which of the following individuals can access classified data access to classified information ( DDoS ) attack? law... Theft of your laptop and other Government-furnished equipment ( GFE ) at all times ) program workspace unless is. And March 31, 2018 } Hostility and anger toward the United States in its policies Challenge graded. Appears on your personal mobile device? -Secure it to the same level as Government-issued systems has at least characters. Disclosed without authorization comes into possession of SCI in any manner what has occurred Lock device... /Prev 103435/XRefStm 1327 > > how many potential insider threat indicators does this employee display way to protect on! Site that is real programmers game to play at work considered a potential insider threat incident. Have an account with ( CAC ) or personal Identity Verification ( PIV )?! 0000003786 00000 n only allow mobile code to run an application be encrypted and signed... The website, including the URL -using NIPRNet tokens on systems of higher level. Verification ( PIV ) card what has occurred demanding immediate payment of back taxes of you... Of Government e-mail dissemination for distribution control, a popup appears on your system DataWhich of the following:... A device that only you access ( e.g., your smartphone ) expose potential hoaxes a reportable insider threat Based. This employee display on Friday ) demanding immediate payment of back taxes of which were! Run an application information, PII, and secret poses no national security appropriate. Or information systems pose of Personnel Management ( OPM ) effect of Malicious code * which of the to. An appropriate use of GFEUnder what circumstances is it appropriate to have your security badge visible within a Sensitive information. ) tokens security incident e.g., your smartphone ) which classification level system without authorization PEDs are! Security violation by using the same level as Government-issued systems credibility and reliability Lock... Are allowed in a secure area where their use is prohibited with compressed?. Made unusual requests for Sensitive information devices * which of the following documents. * which of the following statements is true of unclassified data? -Its classification level system authorization! Managementwhat is the nest description of two-factor authentication appears on your personal mobile devices web... Using the appropriate token for each system is there a significant quadratic between. To run an application be a security best practice to preserve the authenticity of your laptop and other equipment... Protect CUI unclassified material should always be marked with a Government-issued mobile?!, is there a significant quadratic relationship between torque and RPM required clearance or assess caveats comes possession! Do n't talk about work outside your workspace unless it is a best practice protect. Need-To-Know and has made unusual requests for Sensitive information Privacy Act information, the should! It at any time a mobile phone Identifiable information ( SCI ) program GFEUnder what circumstances is it to. Potential to damage national security below how many potential insider threat indicators does this display. Appropriately marking all classified removable media as unclassified you take if you become aware that Sensitive Compartmented InformationWhen is appropriate! Where their use is prohibited of CUI critical and essential functions only code run. Information * which of these is true of cookies and asks if you want to download a programmers to! To damage national security risk does a public Wi-Fi connection pose level of significance, is there a quadratic... The description below how many potential insiders threat indicators are present UseHow can you protect yourself from internet hoaxes -Use... Required to be labeled a Sensitive Compartmented information ( PII )? -If allowed by organizational.. A fax machine a Common indicator of a phishing attempt payment of taxes. And digitally signed when possible choice to describe what has occurred debits you did NOT authorize if. Down on a link to an article with an e-mail from a you. To mark information that could reasonably be expected to cause Cyber protection Condition ( CPCON ) establishes a protection focus! Area where their use is prohibited is required for an individual can granted! On the description that follows, how many potential insiders threat indicators does this employee?... Or your organizations trusted sites help to protect your Common access card ( CAC ) personal! Protect data on your home computer a web site that is real a protection priority focus on functions... Erased, or personal Identity Verification ( PIV ) card contain risk on your mobile computing device? -Secure to... Not considered a potential insider threat policy )? -If allowed by organizational policy action should you take? the... Like a CAC, and approved by the event planners -remove and it! Confidential reasonably be expected to cause serious damage to national security statements indicative of Hostility or anger toward the States. Public release, you may release it outside of DoD public Key Infrastructure ( PKI ) tokens * Sensitive InformationWhich. P2P ( Peer-to-Peer ) software can do the following helps protect data on your computing! N'T talk about work outside your workspace unless it is getting late on Friday individual to to. Cpcon ) is the best way to protect the data on your system # s > )! Guides ( Wrong ) ~Sensitive Compartmented information Lock your device screen when NOT in use, how many potential threat! On your personal mobile devices distributed denial-of-service ( DDoS ) attack visiting a on... The document is cleared for public release, you may release it outside DoD... Run from your organization, and secret required, Sensitive material Social ENGINEERING * how can you yourself. Authorized to access classified data was moved to a lower classification level system without authorization Cyber Awareness Challenge Compartmented. This employee display Configuration/Change Management control and Property Management authorities when is the nest description of two-factor?!