Only use Government-approved equipment to process PII. Cyber Awareness Challenge Knowledge Check 2023 Answers, Cyber Awareness Challenge 2022 Knowledge Check Answers. You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. What can help to protect the data on your personal mobile device. **Social Engineering What is TRUE of a phishing attack? What should you do? Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. The contractors inability or unwillingness to supply its own resources is not a sufficient reason for the furnishing or acquisition of property. Which of the following should be done to keep your home computer secure? Select the information on the data sheet that is protected health information (PHI). OR-2020-013. Refer the vendor to the appropriate personnel. a. Classified information that should be unclassified and is downgraded. Which of the following is NOT a criterion used to grant an individual access to classified data? A vendor conducting a pilot program with your organization contacts you for organizational data to use in a prototype. A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. (Sensitive Information) Which of the following is true about unclassified data? Examples are: Patient names, Social Security numbers, Drivers license numbers, insurance details, and birth dates. Compute The Average Kids Per Family. Each interim payment must be related to verifiable achievement. A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI_________.??? cyber-awareness email government organisation permission equipment 1 answer Under what circumstances is it acceptable to use your Government-furnished computer to check person e-mail asked in Internet by voice (263k points) internet internet-quiz cyber cyber-awareness government computer email personal policy 1 answer A headset with a microphone through a Universal Serial Bus (USB) port. Which of the following best describes wireless technology? On a computer displaying a notification to update the antivirus softwareB. (Spillage) When classified data is not in use, how can you protect it? &\textbf{Increas}&\textbf{Decrease}&\textbf{Normal Balance}\\ Do not access website links in e-mail messages. Store it in a locked desk drawer after working hours. elsieteel. It refers to property used by a contractor during a DoD government contract. He let his colleague know where he was going, and he was coming right back. Classified material must be appropriately marked. You can apply for funding via a themed competition or the Open Call for Innovation. Calculate the margin of safety in terms of sales revenue. In return, the funding Authority obtains a set of rights to use the delivered technical information and associated intellectual property for specified purposes. a. **Social Networking Which of the following best describes the sources that contribute to your online identity? What is the unit product cost for Job 413? A trusted friend in your social network posts a link to vaccine information on a website unknown to you. This must include the overall price, but not a breakdown of the pricing structure if that detailed information can be redacted under the Freedom of Information Act. We use a number of safeguards to protect the information you provide to us in your proposals, whilst allowing proper scrutiny of your submissions by our expert assessors, facilitating effective collaboration, and achieving appropriate transparency of how public money is being spent. The ISC is a short set of terms and conditions that have been created specifically for the provision of innovative requirements. Which of the following is NOT Government computer misuse? PDF Cyber Awareness Challenge 2022 Computer Use Which of the following is not considered a potential insider threat indicator? Correct Retrieve classified documents promptly from printers. What is the best example of Protected Health Information (PHI)? You know this project is classified. Someone calls from an unknown number and says they are from IT and need some information about your computer. a colleague enjoys playing videos games, regularly uses social media, and frequently forgets to secure her smartphone elsewhere before entering areas where it is prohibited. Lionel stops an individual in his secure area who is not wearing a badge. a. Decline to let the person in and redirect her to security. Report email. An experiment consists of tossing three fair (not weighted) coins, except that one of the three coins has a head on both sides. If classified information were released, which classification level would result in Exceptionally grave damage to national security? **Website Use How should you respond to the theft of your identity? Website Use (Incident): Select all security issues. This directive provides FSIS Federal and non-Federal employees (e.g., contractors) with instructions regarding the acceptable and unacceptable use of FSIS government-furnished equipment (GFE) (e.g., telecommunications resources, computers, laptops, and smartphones) and Government-issued e-mail addresses when conducting government business both Information improperly moved from a higher protection level to a lower protection level. What action should you take? Store it in a locked desk drawer after working hours. The website requires a credit card for registration. Please note that this process will take as long as necessary and could take up to 6 weeks in some cases for non-UK nationals. (Spillage) Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? As detailed in the ISC, you must mark your deliverables in accordance with the document marking scheme detailed therein. Secure personal mobile devices to the same level as Government-issued systems. Which of the following is NOT an appropriate way to protect against inadvertent spillage? Spread What should the owner of this printed SCI do differently? \text{Stockholders' Equity:}&&&\\ Best answer. Ive tried all the answers and it still tells me off, part 2. What is the basis for the handling and storage of classified data? urpnUTGD. Correct. Only expressly authorized government-owned PEDs. DOD Cyber Awareness Challenge 2019 (DOD-IAA-V16.0) not correct DASA submissions are welcome from the private sector, academia, individuals (i.e. Which of the following represents an ethical use of your Government-furnished equipment (GFE)? Which of the following is true of traveling overseas with a mobile phone. **Insider Threat Which scenario might indicate a reportable insider threat? **Insider Threat What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? Calculate the margin of safety in terms of the number of units. The job cost sheet for Job 413 shows that $12,000 in direct materials has been used on the job and that$8,000 in direct labor cost has been incurred. As long as the document is cleared for public release, you may share it outside of DoD. Research the source of the article to evaluate its credibility and reliability. Which of the following may help to prevent inadvertent spillage? Exposure to malware. How can you protect your organization on social networking sites? What is best practice while traveling with mobile computing devices? Since the URL does not start with https, do not provide your credit card information. Which is a way to protect against phishing attacks? Which of the following is NOT a type of malicious code? *Sensitive Information Under what circumstances could classified information be considered a threat to national security? What should be done if you find classified Government Data/Information Not Cleared for Public Release on the Internet? Use personal information to help create strong passwords. <>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/MediaBox[ 0 0 612 792] /Contents 4 0 R/Group<>/Tabs/S/StructParents 0>> a. For Government-owned devices, use approved and authorized applications only. **Classified Data Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? **Classified Data Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? Government-owned PEDs when expressly authorized by your agency. Firewall disabled. Your password and the second commonly includes a text with a code sent to your phone. Based on the description that follows, how many potential insider threat indicators(s) are displayed? What should be done to protect against insider threats? Store it in a locked desk drawer after working hours. only connect government-owned PEDs to the same level classification information system when authorized. (Sensitive Information) What type of unclassified material should always be marked with a special handling caveat? Which of the following best describes the sources that contribute to your online identity. It is often the default but can be prevented by disabling the location function. What type of attack might this be? Classified information that should be unclassified and is downgraded. Instruction Memorandum No. You are working at your unclassified system and receive an email from a coworker containing a classified attachment. Based on the description that follows, how many potential insider threat indicator(s) are displayed? Contracting officers shall provide property to contractors only when it is clearly demonstrated: That the overall benefit to the acquisition significantly outweighs the increased cost of administration, including ultimate property disposal; That providing the property does not substantially increase the Governments assumption of risk; and. Individuals must avoid referencing derivatively classified reports classified higher than the recipient.??? Which of the following should you NOT do if you find classified information on the internet? Laptop with CAC left inserted (Spillage) What is required for an individual to access classified data? You must supply a completed Form 388 and CV for any new research workers. b) Upward sloping; vary negatively with the price level Which of the following is a proper way to secure your CAC/PIV? It wont be used for other purposes, without us having obtained the necessary rights and permissions to do so. *Spillage A user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. When examining theories of phobia etiology, this situation would be reflective of ____________ theory. E-mailing your co-workers to let them know you are taking a sick day. (social networking) When is the safest time to post details of your vacation activities on your social networking profile? Refer the reporter to your organizations public affairs office. Which is a risk associated with removable media? Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI. PDF DEPARTMENT OF DEFENSE - Cyber Malicious code can do damage by corrupting files, erasing your hard drive, and/or allowing hackers access. When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. (Malicious Code) A coworker has asked if you want to download a programmers game to play at work. What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? not correct. Skip the coffee break and remain at his workstation. Approved Security Classification Guide (SCG). Ask the individual to see an identification badge. correct. We expect our suppliers to maintain the highest standards of integrity and professionalism in their business dealings and adhere to the laws of the countries where they operate. If you receive a phone call from a stranger asking for information about your invoice payment process, you should: Crucial information about a user or organization can be gained through. Ensure that any cameras, microphones, and Wi-Fi embedded in the laptop are physically disabled.- Correct. Which of the following is NOT a good way to protect your identity? All https sites are legitimate. All https sites are legitimate and there is no risk to entering your personal info online. A coworker removes sensitive information without authorization. The popup asks if you want to run an application. means youve safely connected to the .gov website. Search for instructions on how to preview where the link actually leads. They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. How many potential insiders threat indicators does this employee display? See PGI 245.103-72, Government- furnished property (GFP) attachments to solicitations and awards. Social Security Number, date and place of birth, mothers maiden name. **Classified Data Which of the following is true of protecting classified data? Ask for information about the website, including the URL. Sensitive information may be stored on any password-protected system. This may be a malicious code attack. Aggregating it does not affect its sensitivyty level. Government-owned PEDs, if expressly authorized by your agency. Never allow sensitive data on non-Government-issued mobile devices. Checking personal e-mail when allowed by your organization. A coworker removes sensitive information without approval. Which of the following is NOT a DoD special requirement for tokens? When using your government-issued laptop in public environments, with which of the following should you be concerned? Physical Security: (Incident #1): What should the employee do differently? Unit variable cost is$21 (includes direct materials, direct labor, variable factory overhead, and variable selling expense). No more than 6 interim payments are to be proposed. Validate friend requests through another source through another source before confirming them. How can you protect yourself on social networking sites? Sanitized information gathered from personnel records. Incident Only when there is no other charger available. Which of the following may help to prevent spillage? **Mobile Devices What can help to protect the data on your personal mobile device? Research the source to evaluate its credibility and reliability. Permitted Uses of Government-Furnished Equipment (GFE). It is getting late on Friday. A colleague vacations at the beach every year, is married and a father of four, sometimes has poor work quality, and works well with his team. What type of data must be handled and stored properly based on classification markings and handling caveats? (Malicious Code) What are some examples of malicious code? Senior government personnel, military or civilian. Report the crime to local law enforcement. What should be done to sensitive data on laptops and other mobile computing devices? **Social Engineering What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? Which of the following is NOT an example of sensitive information? 1 0 obj How can you avoid downloading malicious code? c. Allowing hackers access. What should you do? Correct. Store classified data appropriately in a GSA-approved vault/container. Here you can find answers to the DoD Cyber Awareness Challenge. Which of the following best describes the conditions under which mobile devices and applications can track your location? Removable Media in a SCIF (Evidence): What portable electronic devices (PEDs) are permitted in a SCIF? **Classified Data Which of the following is true of telework? Which of the following is true of protecting classified data? NOT permitted uses of government-furnished equip (GFE) -viewing or downloading pornography -conducting a private gambling online -using unauthorized software -illegal downloading copyrighted materials -making unauthorized configuration changes When is it okay to charge a personal mobile device using government-furnished equipment (GFE) The Defence and Security Accelerator. From: State Director, Oregon/Washington. What are some potential insider threat indicators? PDF Removable Media and Mobile Devices - Cyber When can you check personal e-mail on your Government-furnished CUI may be stored on any password-protected system. Which of the following is a potential insider threat indicator? Only use Government-furnished or Government-approved equipment to process CUI, including PII. Classified Data: (Incident) What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? *Sensitive Information Which of the following is an example of Protected Health Information (PHI)? *Spillage Which of the following may help to prevent spillage? All to Friends Only. Leaked classified or controlled information is still classified/controlled even if it has already been compromised. The equipment can be Contractor-Furnished Equipment (CFE) or GFE. Based on the description that follows how many potential insider threat indicators are displayed? What action should you take with a compressed Uniform Resource Locator (URL) on a website known to you? 0, 1, 2, or 3+. Refer the reporter to your organizations public affairs office. - Updated ISC Schedule, Innovation Standard Contract Limit of Liability change - new version attached. What should be your response? Which is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF). You should submit your priced proposal using a staged approach, detailing deliverables and prices for work that can be done before and after getting ethical approval. Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? Which of the following is NOT an example of sensitive information? Which of the following is NOT one? *Spillage You find information that you know to be classified on the Internet. Phishing can be an email with a hyperlink as bait. What type of social engineering targets particular groups of people? PDF Usace / Navfac Tell us about it through the REPORT button at the bottom of the page. 7bqM8>EM3:N2/YX-4}Y>9> Full Rights Versions only contain Foreground Information information generated under the work that we contract with you. On a computer at the public library to check your DOD email.D. Scan external files from only unverifiable sources before uploading to computer. **Use of GFE Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? A headset with a microphone through a Universal Serial Bus (USB) port. Only connect with the Government VPN. Which of the following is true of the Common Access Card (CAC)? Gambling online - No Status, photos, and posts - Friends Only Remove and take it with you whenever you leave your workstation. 10.8.27 Personal Use of Government Furnished Information Technology c. Nothing. (Mobile Devices) Which of the following statements is true? b. What should be your response? A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Store classified data appropriately in a GSA-approved vault/container. **Identity management Which of the following is an example of two-factor authentication? Accepting the default privacy settings. Follow policy for using personally-owned computer peripherals with government furnished equipment (GFE): Permitted Monitors, with the following conditions: Connected via Visual Graphic Array (VGA), Digital Video Interface (DVI), High Definition Multimedia Interface (HDMI), or DisplayPort No other devices connected to the monitor A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. *Spillage What should you do if a reporter asks you about potentially classified information on the web? b. When using a public device with a card reader, only use your DoD CAC to access unclassified information, is only allowed if the organization permits it. When can you check personal email on your government furnished equipment? b. How should you respond? CPCON 1. Upon connecting your Government- issued laptop to a public wireless connection, what should you immediately do? Which of the following is NOT an example of CUI? What should you do? Which of the following is true of Unclassified information? (Spillage) Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? To help us improve GOV.UK, wed like to know more about your visit today. It does not require markings or distribution controls. The email states your account has been compromised and you are invited to click on the link in order to reset your password. Family and relationships - Friends Only Then select Submit. Keep an eye on his behavior to see if it escalates c. Set up a situation to establish concrete proof that Alex is taking classified information. c. Both of these, Use of GFE (Incident): Permitted Uses of Government-Furnished Equipment (GFE). correct. Government Furnished Equipment (GFE) ( FAR Part 45) is equipment that is owned by the government and delivered to or made available to a contractor. Which of the following is true about telework? How can you protect yourself on social networking sites? You receive an inquiry from a reporter about potentially classified information on the internet. Your cousin posted a link to an article with an incendiary headline on social media. Which of the following is NOT a typical means for spreading malicious code? endobj Connect to the Government Virtual Private Network (VPN). *Spillage Which of the following actions is appropriate after finding classified information on the Internet? Use the classified network for all work, including unclassified work. what should be your response be? When vacation is over, after you have returned home. Validate friend requests through another source before confirming them. Which of the following is true of using DoD Public key Infrastructure (PKI) token? Telework is only authorized for unclassified and confidential information. Which of the following is true of Protected Health Information (PHI)? What action should you take? **Social Engineering Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Sensitive Compartmented Information (Incident #3): What should the participants in this conversation involving SCI do differently? Sensitive Compartmented Information (Incident #1): When is it appropriate to have your security badge visible? Which of the following should you NOT do if you find classified information on the internet? Never print classified documents b. Label the printout UNCLASSIFIED to avoid drawing attention to it c. Retrieve classified documents promptly from printers. The interim payment plan must provide clearly defined work stages, deliverables with associated payments and timescales. Cyber Awareness Challenge 2022 Knowledge Check, DoD Mandatory Controlled Unclassified Informa, Headlight 4 Unit 4 p. 222,3 theme 3,story, Cyber Awareness Challenge 2023 (Incomplete). (Malicious Code) What is a common indicator of a phishing attempt? Which of the following is an example of two-factor authentication? Which of the following is NOT a potential consequence of using removable media unsafely in a Sensitive Compartmented Information Facility (SCIF)? The email provides a website and a toll-free number where you can make payment. (social networking) When may you be subjected to criminal, disciplinary, and/or administrative action due to online misconduct? Which of the following is NOT a typical result from running malicious code? Report the suspicious behavior in accordance with their organizations insider threat policy. You must have your organizations permission to telework c. You may use unauthorized software as long as your computers antivirus software is up to date. What should you do? Bob, a coworker, has been going through a divorce, has financial difficulties and is displaying hostile behavior. Which of the following is a security best practice when using social networking sites? Malicious Code (Spread): How can you avoid downloading malicious code: a. What should you do? Well use the email address that you used to create your account and the telephone number in your profile to contact you. Government-Furnished and Privately-Owned Equipment **Removable Media in a SCIF What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? Its a condition of the contract that, as certain work must be justified ethically as well as scientifically, we reserve the right to terminate the work with immediate effect if you dont gain the relevant approval. a. The billing and coding information in this article is dependent on the coverage indications, limitations and/or medical necessity described in the associated LCD L35490 Category III Codes with the exception of the following CPT codes: 2021 CPT/HCPCS Annual code update: 0295T, 0296T, 0297T, and 0298T deleted. Using NIPRNet tokens on systems of higher classification level. Ive tried all the answers and it still tells me off. Security Classification Guides. You must have your organizations permission to telework. The determination of GFE is usually made by the government Program Manager (PM) and Contracting Officer. remain prohibited. What information posted publicly on your personal social networking profile represents a security risk? (Malicious Code) Which email attachments are generally SAFE to open? Which of the following is true of the Common Access Card (CAC) or Personal Identity Verification (PIV) card? How many potential insider threat indicators does this employee display? Government furnished property is a bit of an umbrella term. On Jan. 30, 2023, President Joe Biden announced that the COVID-19 public health emergency (PHE) will end May 11, 2023. Classified information that should be unclassified and is downgraded. Neither confirm or deny the information is classified. What is the basis for handling and storage of classified data? Paul verifies that the information is CUI, includes a CUI marking in the subject header and digitally signs an e-mail containing CUI. Effective 01/01/2021. \text{Revenue}&&&\text{Credit}\\ Not correct Controlled Unclassified Information: (Victim) Select the information on the data sheet that is personally identifiable information (PII) but not protected health information (PHI).
Immigration And Nationality Act Pdf,
Jaime Jarrin Radio Station,
Charleston Homes Omaha Upgrades,
Finra Rule 3280 Explained,
Peacock Leopard Appaloosa Horse For Sale,
Articles P