Research the source to evaluate its credibility and reliability. Here you can find answers to the DoD Cyber Awareness Challenge. (GFE) When can you check personal e-mail on your Government-furnished equipment (GFE)? (Sensitive Information) What type of unclassified material should always be marked with a special handling caveat? b. b. Download the information. Which of the following is an example of a strong password? In your opinion, will there be individual differences? Hostility or anger toward the United States and its policies. Unit variable cost is$21 (includes direct materials, direct labor, variable factory overhead, and variable selling expense). Never use personal e-mail accounts for transmitting PII. He has the appropriate clearance and a signed, approved, non-disclosure agreement. Unclassified documents do not need to be marked as a SCIF. Your favorite movie. Maintain visual or physical control of the device. **Classified Data Which classification level is given to information that could reasonably be expected to cause serious damage to national security? Understanding and using the available privacy settings. **Social Networking When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? Which of the following is a clue to recognizing a phishing email? Classification markings and handling caveats. Spread Full Rights Versions only contain Foreground Information information generated under the work that we contract with you. Which of the following may help to prevent spillage? (Sensitive Information) What certificates are contained on the Common Access Card (CAC)? GO1 Classification markings and handling caveats. Store your Common Access Card (CAC) or Personal Identity Verification (PIV) card in a shielded sleeve ~Write your password down on a device that only you access (e.g., your smartphone) Change your password at least every 3 months Enable two-factor authentication whenever available, even for personal accounts. How can you protect data on your mobile computing and portable electronic devices (PEDs)? Reviewing and configuring the available security features, including encryption. What should the participants in this conversation involving SCI do differently? It is releasable to the public without clearance. Store it in a shielded sleeve to avoid chip cloning. Use the classified network for all work, including unclassified work. Correct. 0, 1, 2, or 3+. Only use Government-furnished or Government-approved equipment to process PII. You must possess security clearance eligibility to telework. A pop-up window that flashes and warns that your computer is infected with a virus. Ec-YBjAzR-~Q`0`=bA_NwMqD!sH{R- h+ Q ,?RK A smartphone that transmits credit card payment information when held in proximity to a credit card reader. 1068 0 obj <> endobj *Classified Data The DoD requires use of two-factor authentication for access. They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. Y"{+lr)v&e]8OMoUBgT+E G +$f}'@$c(QxE'{=Q[M{Qdf7N*1^1zyti#;@_r+~>(.D$!yn@L3pgA0#Dk(-]+utfoZaF0gyz=l%Ec\'"]e:7i/-L(*#Nw%r0I3Km@ P@Ya5 $ .nlPE*k8]xkh0D!_/~CyVIS Attempting to access sensitive information without need-to-know. *Spillage A user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. How can malicious code cause damage? Malicious Code (Spread): How can you avoid downloading malicious code: a. Throughout the life of any contract you must notify us in writing if you intend to change or add additional research workers. Search for instructions on how to preview where the link actually leads. DASA reserves the right to disclose on a confidential basis any information it receives from you during the procurement process to any third party engaged by DASA for the specific purpose of evaluating or assisting DASA in the evaluation of your proposal. Classified information that should be unclassified and is downgraded. Government Furnished Equipment (GFE) - AcqNotes The person looked familiar, and anyone can forget their badge from time to time. a. ( When leaving your work area, what is the first thing you should do? Contact the IRS using their publicly available, official contact information. Secure .gov websites use HTTPSA Setting weekly time for virus scan when you are not on the computer and it is powered off. a. CUI may be stored on any password-protected system b. CUI may be stored in a locked desk after working hours c. CUI may be emailed if encrypted. Refer the vendor to the appropriate personnel. Immediately notify your security point of contact. Unclassified documents do not need to be marked as a SCIF. Use of Government Furnished Equipment (GFE) During Foreign Travel. Ive tried all the answers and it still tells me off. Based on the description that follows, haw many potential insider threat indicator(s) are displayed? Personally-owned external monitors may be connected to DoD-issued computers in telework environments via VGA or DVI, but not via USB. \text{Capital Stock}&\text{Credit}&&\\ An experiment consists of tossing three fair (not weighted) coins, except that one of the three coins has a head on both sides. elsieteel. Create separate user accounts with strong individual passwords. CUI includes, but is not limited to Controlled Technical Information (CTI), Personally Identifiable Information (PII), Protected Health Information (PHI), financial information, personal or payroll information, proprietary data and operational information. Which of the following is an example of two-factor authentication? correct. *Sensitive Compartmented Information When should documents be marked within a Sensitive Compartmented Information Facility (SCIF). This must include the overall price, but not a breakdown of the pricing structure if that detailed information can be redacted under the Freedom of Information Act. c. Analyze the other workstations in the SCIF for viruses or malicious code. How can you protect yourself on social networking sites? Which of the following may help to prevent inadvertent spillage? Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. Which Of The Following Is Not A Correct Way To Protect CUI. Keep an eye on his behavior to see if it escalates c. Set up a situation to establish concrete proof that Alex is taking classified information. The general policy is to have the contractor furnish the equipment needed. You believe that you are a victim of identity theft. **Social Engineering What is TRUE of a phishing attack? Which of the following best describes the conditions under which mobile devices and applications can track your location? What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? Memory sticks, flash drives, or external hard drives. Social Security Number; date and place of birth; mothers maiden name. Of the following, which is NOT a characteristic of a phishing attempt? Government furnished property can be designated as either equipment or material. The Contractor shall use Standard Form 1428 for Inventory Disposal. When using a fax machine to send sensitive information, the sender should do which of the following? Be aware of classification markings and all handling caveats. When may you be subject to criminal, disciplinary, and/or administrative action due to online harassment, bullying, stalking, hazing, discrimination, or retaliation? Do not access links or hyperlinked media such as buttons and graphics in email messages. urpnUTGD. A Form 388 will be sent to you if youre successful under a DASA competition. **Insider Threat What type of activity or behavior should be reported as a potential insider threat? Sensitive information may be stored on any password-protected system. DOD CYBER AWARENESS *UPDATED* Flashcards | Quizlet GFA is not provided lightly and only where there are substantial and pressing reasons (e.g. This information will only be used for the purposes for which it is provided to us. Which of the following statements is NOT true about protecting your virtual identity? Avoid talking about work outside of the workplace or with people without a need-to-know, Report the suspicious behavior in accordance with their organization's insider threat policy. %PDF-1.7 *Malicious Code What are some examples of malicious code? a. Contracting officers shall provide property to contractors only when it is clearly demonstrated: That the overall benefit to the acquisition significantly outweighs the increased cost of administration, including ultimate property disposal; That providing the property does not substantially increase the Governments assumption of risk; and. Use a digital signature when sending attachments or hyperlinks. Updated DASA Terms and Conditions - including new contract and intellectual property guidance. What should you do to protect yourself while on social networks? Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)? Avoid talking about work outside of the workplace or with people without a need-to-know. When classified data is not in use, how can you protect it? What is a best practice to protect data on your mobile computing device? Heres how you know. Spillage because classified data was moved to a lower classification level system without authorization. No federal endorsement of sponsors intended. A vendor conducting a pilot program with your organization contacts you for organizational data to use in a prototype. **Social Networking Which of the following is a security best practice when using social networking sites? Home Computer Security (Evidence): Update Status: Install or Remind me later, Home Computer Security (Evidence): Firewall Status: Enable or Keep Disabled, Home Computer Security (Evidence): Virus Alert! Decline to let the person in and redirect her to security. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. Limited Rights Versions of deliverables wont be released by us outside of Government. **Use of GFE When can you check personal e-mail on your Government-furnished equipment (GFE)? What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF. Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only? Which of the following is a good practice for telework? endobj *Sensitive Compartmented Information When is it appropriate to have your security badge visible? Security updates are ready to install. Your health insurance explanation of benefits (EOB). The information contained in this Website is for informational purposes only and is not intended as a form of direction or advice and should not be relied upon as a complete definitive statement in relation to any specific issue. Correct. c. Be aware of classified markings and all handling caveats. They can be part of a distributed denial-of-service (DDoS) attack. relates to reporting of gross mismanagement and/or abuse of authority. What is the best course of action? Ask the individual to see an identification badge. **Removable Media in a SCIF What must users ensure when using removable media such as compact disk (CD)? We will make payment in accordance with the terms of the relevant contract. Directives issued by the Director of National Intelligence.
What Has Faber Invented, And Why Is It Important?, Dr David Martin Butterfly Of The Week, Articles P
permitted uses of government furnished equipment 2023