What is the basis for handling and storage of classified data? It contains certificates for identification, encryption, and digital signature. Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. Update now? A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI________. What should Sara do when publicly available Internet, such as hotel Wi-Fi? DASA reserves the right to disclose on a confidential basis any information it receives from you during the procurement process to any third party engaged by DASA for the specific purpose of evaluating or assisting DASA in the evaluation of your proposal. **Mobile Devices Which of the following helps protect data on your personal mobile devices? You should remove and take your CAC/PIV card whenever you leave your workstation. Alex demonstrates a lot of potential insider threat indicators. c. Report it to security. What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? Checking personal e-mail when allowed by your organization. Classified Data: (Incident) What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? Classified Information can only be accessed by individuals with. Verified answer. Photos and videos you are in - Friends Only Refer the reporter to your organizations public affairs office. Neither confirm or deny the information is classified. c. Do not access website links in e-mail messages. Best wishes It is getting late on Friday. Store it in a GSA approved vault or container. A company assigns overhead cost to completed jobs on the basis of 120% of direct labor cost. When your vacation is over, and you have returned home. In setting up your personal social networking service account, what email address should you use? Retrieve classified documents promptly from printers. b. Linda encrypts all of the sensitive data on her government issued mobile devices. When considering Government contracts, there are two approaches that are used for providing the equipment necessary to execute the contract. HTMO@[)4T@c4RIhj{v He has the appropriate clearance and a signed, approved, non-disclosure agreement. We use a number of safeguards to protect the information you provide to us in your proposals, whilst allowing proper scrutiny of your submissions by our expert assessors, facilitating effective collaboration, and achieving appropriate transparency of how public money is being spent. *Spillage You find information that you know to be classified on the Internet. Which of the following is NOT one? How many potential insiders threat indicators does this employee display? Government-furnished assets. Which of the following is true of the Common Access Card (CAC) or Personal Identity Verification (PIV) card? Government-owned PEDs when expressly authorized by your agency. *Sensitive Information Which of the following is the best example of Personally Identifiable Information (PII)? Where any deliverable is subject to third party intellectual property rights (IPR) you must also describe this in your proposal. **Website Use Which of the following statements is true of cookies? Making unauthorized configuration changes - No. CPCON 5 (Very Low: All Functions). 1101 0 obj <>stream **Social Networking Which of the following best describes the sources that contribute to your online identity? What is a valid response when identity theft occurs? endstream endobj 1074 0 obj <>stream Mobile Devices (Incident): When is it okay to charge a personal mobile device using government-furnished equipment (GFE)? What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? Which of the following is NOT a home security best practice? Software that installs itself without the users knowledge c. A firewall that monitors and controls network traffic. You receive an inquiry from a reporter about government information not cleared for public release. When is it appropriate to have your security badge visible? Which of the following is true of portable electronic devices (PEDs) in a Sensitive Compartmented Information Facility (SCIF)? **Insider Threat What is an insider threat? When may you be subject to criminal, disciplinary, and/or administrative action due to online harassment, bullying, stalking, hazing, discrimination, or retaliation? IRS employees are permitted to utilize secure Public Wi-Fi access (e.g., hospital, Internet caf, coffee shop, public library). ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. When using mobile computing devices, including laptops and cell phones, in public: Be careful of information visible on your mobile computing device; consider screen protection Maintain possession of laptop and other government-furnished equipment (GFE) at all times and be extra vigilant in protecting it Protect your mobile computing device endstream endobj 1072 0 obj <>stream | cpLo' ;8?NfW\\T| All prices quoted for DASA proposals are firm (non-variable) and must be exclusive of VAT. All government-owned PEDs c. Only expressly authorized government-owned PEDs. Classified information that should be unclassified and is downgraded. A type of phishing targeted at high-level personnel such as senior officials. Someone calls from an unknown number and says they are from IT and need some information about your computer. Country A has a (n) ___ in the production of a good if it can produce the good at lower opportunity cost than country B . However, the equipment can be furnished by the Government if it is in the best interest of the Government to provide GFE for use by the contractor. **Social Networking When is the safest time to post details of your vacation activities on your social networking profile? A trusted friend in your social network posts a link to vaccine information on a website unknown to you. Which of the following statements is true of cookies? Classified information that is accidentally moved to a lower classification or protection level. Then select Save. **Physical Security What is a good practice for physical security? Only use Government-furnished or Government-approved equipment to process PII. Who designates whether information is classified and its classification level? Use the classified network for all work, including unclassified work. What should you do? What should you do? Use the classified network for all work, including unclassified work. *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. When traveling or working away from your main location, what steps should you take to protect your devices and data? Article Text. If you participate in or condone it at any time. Note any identifying information, such as the websites URL, and report the situation to your security POC. Under the PHE, the federal government implemented a range of modifications and waivers impacting Medicare, Medicaid and private insurance requirements, as well as numerous other programs, to provide relief to healthcare . You have reached the office door to exit your controlled area. a. Follow instructions given only by verified personnel. Verified answer. Which scenario might indicate a reportable insider threat? Always use DoD PKI tokens within their designated classification level. Research the source to evaluate its credibility and reliability. Government Furnished Equipment (GFE) ( FAR Part 45) is equipment that is owned by the government and delivered to or made available to a contractor. Check in location via GPS: Off. %PDF-1.7 (Sensitive Information) What type of unclassified material should always be marked with a special handling caveat? Ask them to verify their name and office number. You should remove and take your CAC/PIV card whenever you leave your workstation. Which of the following is a good practice to avoid email viruses? NB0A 3v(Raz-i*%d^pO0!L'$u(qly/;rg((ob {|Y_1z^oh&d;uE[;W5I_ "j Which of the following is NOT a requirement for telework? Do not download it. How can you protect your organization on social networking sites? _I`vm `V k\Up k[t]I*+oDa,~v0j:g5wVoLQ:@n-62.Sm-"z.Z~-C-K8Yt_@}aVa{]ppwB6#fR4,r\+ l-sZO15 Use a common password for all your system and application logons. Nothing. a. As part of the survey the caller asks for birth date and address. It should only be in a system while actively using it for a PKI-required task. For proposals that we fund, in accordance with the Governments Transparency Agenda, we are required to publish information in respect of Contract documents, comprising: In addition to the above, for proposals that we fund we will publish on DASA website your organisation name and type; DASA reference (ACCxxxxxx) and project title; and contract value. (Home computer) Which of the following is best practice for securing your home computer? A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive new car, and has unexplained absences from work. Remove and take it with you whenever you leave your workstation. The website requires a credit card for registration. CPCON 1. We wont pre-fund any expenditure, so interim payment claims mustnt include costs not yet incurred. Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. Only use a government-issued thumb drive to transfer files between systems. A total of 200 units were produced in Job 413. Not correct We thoroughly check each answer to a question to provide you with the most correct answers. Which of the following is NOT a correct way to protect CUI? a. A system reminder to install security updates b. **Removable Media in a SCIF What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? Update or Remind me later? Aggregating it does not affect its sensitivyty level. The following practices help prevent viruses and the downloading of malicious code except. Information improperly moved from a higher protection level to a lower protection level. Retrieve classified documents promptly from printers. Share sensitive information only on official, secure websites. lock Contact the IRS using their publicly available, official contact information. Which of the following is NOT sensitive information? Linda encrypts all of the sensitive data on her government issued mobile devices. What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? Browse over 1 million classes created by top students, professors, publishers, and experts. Compromise of data b. Instruction Memorandum No. What action should you take with a compressed Uniform Resource Locator (URL) on a website known to you? To: All Oregon/Washington Bureau of Land Management Employees. Report the crime to local law enforcement. Which of the following is NOT an example of sensitive information? Which of the following does NOT constitute spillage? t { Retrieve classified documents promptly from printers. *Malicious Code Which of the following is NOT a way that malicious code spreads? d) Vertical; can be either greater than or less than the natural level of real output. For each of the items (a) through (l), indicate whether the proper answer is a debit or a credit. Skip the coffee break and remain at his workstation. What should you do? b. Which of the following is true of Controlled Unclassified Information (CUI)? What should be your response? NOT permitted uses of government-furnished equip (GFE) for: Viewing or downloading p*rn*graphy. How can you protect yourself from social engineering? Classified information that should be unclassified and is downgraded. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Which of the following is an example of Protected Health Information (PHI)? How can you protect yourself on social networking sites? The CAC/PIV is a controlled item and contains certificates for: An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? what should you do? Incident #2 not correct b. Ask probing questions of potential network contacts to ascertain their true identity c. Avoid talking about work outside of the workplace or with people without need-to-know. Beware of sudden flashing pop-ups that warn your computer is infected with a virus. Correct Which of the following best describes good physical security? **Social Networking Which of the following information is a security risk when posted publicly on your social networking profile? Select Yes or No for each item. A federal government website managed and paid for by the U.S. Centers for Medicare & Medicaid Services. Which of the following is true of the Common Access Card (CAC)? When unclassified data is aggregated, its classification level may rise. This may be a malicious code attack. What should you do? Directing you to a website that looks real. Have your permissions from your organization, follow your organization guideline, use authorized equipment and software, employ cyber security best practice, perform telework in dedicated when home. Using NIPRNet tokens on systems of higher classification level. DOD CYBER AWARENESS. Removable Media in a SCIF (Evidence): What portable electronic devices (PEDs) are permitted in a SCIF? **Social Engineering Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? a colleague enjoys playing videos games, regularly uses social media, and frequently forgets to secure her smartphone elsewhere before entering areas where it is prohibited. c. Analyze the other workstations in the SCIF for viruses or malicious code. Secure facilities allow open storage of classified material c Classified material may be used in unsecured areas as long as it remains in the possession of an individual with the proper clearance and need-to-know. After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. Identity Management Evidence (Incident): Select all violations at this unattended workstation. *Controlled Unclassified Information Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? where there would be significant financial or quality benefits to the work as a result of using GFA). b. Which of the following is not a best practice to preserve the authenticity of your identity? Linda encrypts all of the sensitive data on her government-issued mobile devices. Which of the following is true of protecting classified data? Porton Down What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Dont include personal or financial information like your National Insurance number or credit card details. IncreasDecreaseNormalBalanceBalancesheetaccounts:AssetDebitLiabilityDebitStockholdersEquity:CapitalStockCreditRetainedEarningsCreditDividendsCreditCreditIncomestatementaccounts:RevenueCreditExpense(l)CreditDebit\begin{array}{lcc} It may prohibit the use of a virtual private network (VPN). Government Furnished Resources (GFR) is personnel, most commonly Service Personnel on long-term loan or secondment. - correct Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? Which scenario might indicate a reportable insider threat? Senior government personnel, military or civilian. c. Allowing hackers access. Physical Security: (Incident #2): What should the employee do differently? Where this is the case you should also state clearly in your proposal the details of the prior contract and the associated intellectual property contract conditions. What action should you take? Government furnished or purchased equipment or services provided to employees as the result of approved reasonable accommodation requests. urpnUTGD. Keep an eye on his behavior to see if it escalates c. Set up a situation to establish concrete proof that Alex is taking classified information. business math. *Sensitive Information Under which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? Which designation marks information that does not have potential to damage national security? The ISC is a short set of terms and conditions that have been created specifically for the provision of innovative requirements. CUI must be handled using safeguarding or dissemination controls. all non-redacted elements of your proposal where these are incorporated into the final contract schedules or the terms and conditions. Total fixed cost equals $78,000 (includes fixed factory overhead and fixed selling and administrative expense). Controlled Unclassified Information: (Victim) Select the information on the data sheet that is protected health information (PHI). **Insider Threat How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? Who is responsible for information/data security? Delete email. Limited Rights Versions of deliverables wont be released by us outside of Government. You must have your organization's permission to telework. The website requires a credit card for registration. What type of attack might this be? This bag contains your government-issued laptop. HHS published the HHS Memorandum: the Use of Government Furnished Equipment during Foreign Travel. Who can be permitted access to classified data? Debra ensures not correct Only when there is no other charger available. You many only transmit SCI via certified mail. Building 5 Which of the following is a clue to recognizing a phishing email? Sanitized information gathered from personnel records. Which of the following may be helpful to prevent inadvertent spillage? What should the employee do differently? Which of the following personally-owned computer peripherals is permitted for use with Government-furnished equipment? Store it in a General Services Administration (GSA)-approved vault or container. correct. b. Many apps and smart devices collect and share your personal information and contribute to your online identity. Which of the following is NOT an example of sensitive information? ALways mark classified information appropriately and retrieve classified documents promptly from the printer. Which of the following should you NOT do if you find classified information on the internet? What describes how Sensitive Compartmented Information is marked? Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. Classification markings and handling caveats. means youve safely connected to the .gov website. Examples are: Patient names, Social Security numbers, Drivers license numbers, insurance details, and birth dates. c. Only connect to known networks, Travel (Incident): What is the danger of using public Wi-Fi connections? HUj@}qDk. What actions should you take with a compressed Uniform Resource Locator (URL) on a website known to you? Which of the following is NOT a type of malicious code? The determination of GFE is usually made by the government Program Manager (PM) and Contracting Officer. requirements to access classified information. Depending on the specifics of any proposed change of use, including any building work . \text{Expense}&(l)&\text{Credit}&\text{Debit}\\ A coworker brings a personal electronic device into prohibited areas. In competitions using the ISC and DEFCON 705 you must also state in your proposal if the deliverables are what we call Full Rights or Limited Rights versions. Is it permitted to share an unclassified draft document with a non-DoD professional discussion group? How many insider threat indicators does Alex demonstrate? *Spillage Which of the following is a good practice to prevent spillage? An official website of the United States government Edited/new version of DASA Short form contract uploaded to documents, Update to text from 'All competitions will use the new' to 'Many competitions, especially Phase 1 earlier TRL competitions, will use the new', Please note we have updated our short form contract template. How should you respond? At all times when in the facility c. At any time during the workday, including when leaving the facility. Spillage: Which of the following should you NOT do if you find classified information on the internet? Which piece of information is safest to include on your social media profile? Setting weekly time for virus scan when you are not on the computer and it is powered off. **Travel What security risk does a public Wi-Fi connection pose? (Spillage) What type of activity or behavior should be reported as a potential insider threat? **Social Networking Which piece if information is safest to include on your social media profile? hb```F3,oFRe@]Xp6)(ndfaP 1Hs30ka`tj l> The property provided to contractors for repair or overhaul is not subject to the requirements of the paragraph of bullet #2 above in this section. Birthday - Friends Only Badges must be visible and displayed above the waist at all times when in the facility. Spillage: Which of the following is NOT an appropriate way to protect against inadvertent spillage? Carrying his Social Security Card with him, DoD employees are prohibited from using a DoD CAC in card-reader-enabled public device, Assigned a classification level by a supervisor. Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI. Correct. Use TinyURLs preview feature to investigate where the link leads. **Social Networking Which of the following is a security best practice when using social networking sites? A Common Access Card and Personal Identification Number. Then select Submit. **Social Engineering Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Which of the following individuals can access classified data? Which of the following actions can help to protect your identity? Validate friend requests through another source before confirming them. Disclaimer: AcqNotes is not an official Department of Defense (DoD), Air Force, Navy, or Army website. **Travel What is a best practice while traveling with mobile computing devices? Which of the following is true of Security Classification Guides? Immediately notify your security point of contact. The email states your account has been compromised and you are invited to click on the link in order to reset your password. In addition to avoiding the temptation of greed to betray his country, what should Alex do differently? You receive a call on your work phone and youre asked to participate in a phone survey. d. All of these. Unauthorized Disclosure of Classified Information for DoD, Security Awareness: Derivative Classification Answers, CITI Ethics, Responsible Conduct, RCR, Law, HTH And IRB Answers, Level 1 Antiterrorism Awareness Training Pretest And Post Test Answers, EVERFI Achieve Consumer Financial Education Answers, Security Pro: Chapter 3 (3.1.8) & 4.1 Security Policies Answers, CITI Module #3 Research in Public Elementary and Secondary Schools, Answers to CTS Unit 7 Lab 7-2: Protocols and Services SNMP, Google Analytics Individual Qualification Exam Answers, Everfi Module 4 Credit Scores Quiz Answers, Which Of The Following Is Not Considered A Potential Insider Threat Indicator. English is the official language for all communication between bidders, DASA and in all parts of DASA proposals. What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? Software that installs itself without the users knowledge. Media containing Privacy Act information, PII, and PHI is not required to be labeled. Correct Proactively identify potential threats and formulate holistic mitigation responses. If classified information were released, which classification level would result in Exceptionally grave damage to national security? Contracting officers shall provide property to contractors only when it is clearly demonstrated: That the overall benefit to the acquisition significantly outweighs the increased cost of administration, including ultimate property disposal; That providing the property does not substantially increase the Governments assumption of risk; and. Which of the following is true of protecting classified data? The Town and Country Planning (Use Classes) Order 1987 ( as amended) puts uses of land and buildings into various categories known as 'Use Classes' which are detailed below. You know this project is classified. Tell us about it through the REPORT button at the bottom of the page. Mobile Devices (Incident): Which of the following demonstrates proper protection of mobile devices? correct. (Malicious Code) What are some examples of removable media? **Insider Threat A colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. c. This is never okay. What should Sara do when using publicly available Internet, such as hotel Wi-Fi? The Contractor shall use Standard Form 1428 for Inventory Disposal. Which of the following is true of Protected Health Information (PHI)? Only use Government-approved equipment to process PII. We fund innovative and exploitable ideas that could lead to an advantage for UK armed forces and national security, and support UK prosperity. What information sources do you think students on your campus use when acquiring dress clothes? Note that all bought-in items will become our property and will be registered as government-furnished assets (GFA). Which of the following is true of traveling overseas with a mobile phone. Use the classified network for all work, including unclassified work. Linda encrypts all of the sensitive data on her government-issued mobile devices. Use personal information to help create strong passwords. Which of the following is an example of malicious code? b) Upward sloping; vary negatively with the price level You can propose an interim payment plan, which must be supported by a detailed expenditure profile showing projected monthly expenditure figures. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Using unauthorized software - No Which of the following is NOT true concerning a computer labeled SECRET? Individuals must avoid referencing derivatively classified reports classified higher than the recipient.??? **Mobile Devices What can help to protect the data on your personal mobile device?
Transformers Prime Meets Animated Fanfiction, Andy Reid Son Car Accident Update, Man Shot And Killed In Houston Last Night, This Website Is Blocked By Your Network Operator Meraki, Articles P