Something you possess, like a CAC, and something you know, like a PIN or password. This includes government officials, military personnel, and intelligence analysts. *Sensitive Compartmented InformationWhat action should you take if you become aware that Sensitive Compartmented Information (SCI) has been compromised? WebClassified Information can only be accessed by individuals with All of the above Which of the following definitions is true about disclosure of confidential information? internet-quiz. On December 31, 2017, the company's Allowance for Doubtful Accounts has an unadjusted credit balance of$14.500. Darryl is managing a project that requires access to classified information. What type of activity or behavior should be reported as a potential insider threat? Classified information is that which a government or agency deems sensitive enough to national security that access to it must be controlled and restricted. **Insider ThreatWhich type of behavior should you report as a potential insider threat? When is conducting a private money-making venture using your Government-furnished computer permitted? \end{array} WebData classification is the process of organizing data into categories for its most effective and efficient use. Follow instructions given only by verified personnel. Compute the payback period for the advertising program. WebStore classified data appropriately in a GSA-approved vault/container. e. Calculate the critical boundaries for the p-chart (i.e., UCL, LCL, Upper AB boundary, etc.). *Mobile DevicesWhat can help to protect the data on your personal mobile device? 0000003201 00000 n
Which of the following individuals can access classified data? Darryl is managing a project that requires access to classified information. **Insider ThreatWhich scenario might indicate a reportable insider threat? Which of the following may help to prevent spillage? Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. *Classified Data Which of the following individuals can access classified data? Malicious code: A man you do not know is trying to look at your Government-issued phone and has asked to use it. Report the crime to local law enforcement. P2P (Peer-to-Peer) software can do the following except: Allow attackers physical access to network assets. *Insider Threat Which type of behavior should you report as a potential insider threat? Call your security point of contact immediately. How should you respond? Classified Information can only be accessed by individuals with -All of the above Classified Information is -Assigned a classification level by a supervisor A coworker has left an unknown CD on your desk. WebOnly persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. \text { Generic competitive strategy } & ? Who can be permitted access to classified data? The proposed recipient is eligible to receive classified information only after he/she has been granted a security clearance by the EOP Security Officer. 2. internet. process is scarce in France. VanDriesen tells her that he is a wine connoisseur himself and often makes purchases Use antivirus software and keep it up to date. What type of activity or behavior should be reported as a potential insider threat? They may be used to mask malicious intent. Classified information is that which a government or agency deems sensitive enough to national security that access to it must be controlled and restricted. While you are waiting for your lunch bill, a stranger picks up your Government-issued phone from your table and proceeds to exit the facility with it. An example is when an individual with access to classified information shares that vital information with a journalist who then releases it. Damage to national security It is permissible to release unclassified information to the public prior to being cleared. Which of the following should you NOT do if you find classified information on the internet?-Download the information. Webasked in Internet by voice (265k points) Question : Which of the following is true about unclassified data? Regardless of state, data classified as confidential must remain confidential. 0000003786 00000 n
What is the best response to an incident such as opening an uncontrolled DVD on a computer in a Sensitive Compartmented Information Facility (SCIF)? classified-document. 0000009188 00000 n
Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. **Classified DataHow should you protect a printed classified document when it is not in use? Clearance eligibility at the appropriate level. Which type of behavior should you report as a potential insider threat? CostleadershipCostleadershipCostleadershipMajorcustomermarket(morethan80%concentration)FranceFranceEnglandU.S.ProductionsiteFranceFranceFranceFrance\begin{array}{lcccc} He has the appropriate clearance and a signed approved non-disclosure agreement. What should you do when you are working on an unclassified system and receive an email with a classified attachment? Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. **Mobile DevicesWhich is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? In order to access this information, these individuals must have security clearance from the appropriate government agency. when is it appropriate to have your security bagde visible? Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. Is it ok to run it? In the body of Smiths report, she Where would you direct him to obtain benchmarking data to help him with his assessment? How many the Cyberspace Protection Conditions (CPCON) are there? Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. Research the source of the article to evaluate its credibility and reliability. internet. Smiths report identifies four wineries that are the major players in the French wine Spillage can be either inadvertent or intentional. **Removable Media in a SCIFWhat must users ensure when using removable media such as compact disk (CD)? A pop-up window that flashes and warns that your computer is infected with a virus. **Social NetworkingWhen is the safest time to post details of your vacation activities on your social networking profile? Which of the following individuals can access classified data? What should you do? Mary Smith, a Level II CFA candidate, was recently hired for an analyst position at the Bank of Ireland. What should you do? Use online sites to confirm or expose potential hoaxes. *Insider ThreatWhich of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? WebClassified data: Must be handled and stored properly based on classification markings and handling caveats Can only be accessed by individuals with all of the following: o Appropriate clearance o Signed and approved non- disclosure agreement o Need-to-know . You must have permission from your organization. Which of the following individuals can access classified data? The French wine industry is consolidating and consists of only 4 wineries today compared to 10 wineries five years ago. Need-to-know is a determination that an individual requires access to specific classified information in the performance of (or assist in the performance of) lawful and authorized government functions and duties. **Social EngineeringWhich may be a security issue with compressed Uniform Resource Locators (URLs)? Investigate the link's actual destination using the preview feature. *Sensitive Compartmented InformationWhen is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF)? What is a good practice for physical security? He has the appropriate clearance and a signed approved non-disclosure agreement. A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. **Identity managementWhich of the following is an example of a strong password? Contact the IRS using their publicly available, official contact information. What must you ensure if you work involves the use of different types of smart card security tokens? **Social EngineeringWhich of the following is a way to protect against social engineering? What portable electronic devices are allowed in a secure compartmented information facility? Web*Classified Data Which of the following individuals can access classified data?-Darryl is managing a project that requires access to classified information. data. Based on the description that follows, how many potential insider threat indicator(s) are displayed? Which of the following individuals can access classified data 2022? A colleague saves money for an overseas vacation every year, is a single father, and occasionally consumes alcohol. Do not access website links, buttons, or graphics in e-mail. P2P (Peer-to-Peer) software can do the following except: Allow attackers physical access to network assets. He has the appropriate clearance and a signed, approved non-disclosure agreement. WebWhich of the following individuals can access classified data? Suggestions for dealing with these problems include encouraging the Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information? **Social NetworkingWhich of the following information is a security risk when posted publicly on your social networking profile? He has the appropriate clearance and a signed approved non-disclosure agreement. Label all files, removable media, and subject headers with appropriate classification markings. *Mobile DevicesWhich of the following is an example of removable media? Allegience Insurance Company's management is considering an advertising program that would require an initial expenditure of $165,500\$ 165,500$165,500 and bring in additional sales over the next five years. & \text { South Winery } & \text { North Winery } & \text { East Winery } & \text { West Winery } \\ Create separate user accounts with strong individual passwords. Which of the following is an appropriate use of Government e-mail? startxref
WebClassified Information can only be accessed by individuals with All of the above Which of the following definitions is true about disclosure of confidential information? Spillage can be either inadvertent or intentional. On June 30, 2018, Jarden Company concludes that a customer's$4,750 receivable (created in 2017) is uncollectible and that the account should be written off. It may be compromised as soon as you exit the plane. At the same time, the distribution of income has become more unequal. What type of activity or behavior should be reported as a potential insider threat? 0000001952 00000 n
**Social NetworkingWhen may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? Which of the following is the best description of two-factor authentication? *Removable Media in a SCIFWhat action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? Use only your personal contact information when establishing your account. Smith tells VanDriesen, In my report I have classified the South *Sensitive Compartmented InformationWhich must be approved and signed by a cognizant Original Classification Authority (OCA)? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. *Insider Threat Which type of behavior should you report as a potential insider threat? *Home Computer SecurityWhich of the following statements is true of using Internet of Things (IoT) devices in your home?