When is it okay to charge a personal mobile device using government-furnished equipment (GFE)? **Social Networking Which piece if information is safest to include on your social media profile? Adversaries exploit social networking sites to disseminate fake news Correct. What type of social engineering targets particular individuals, groups of people, or organizations? Correct. What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. Uploaded new terms and conditions document: DASA Open Call Terms and Conditions July 2022 (Also contains Schedules). A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI. Removable Media in a SCIF (Evidence): What portable electronic devices (PEDs) are permitted in a SCIF? **Insider Threat What function do Insider Threat Programs aim to fulfill? Press release data. What security device is used in email to verify the identity of sender? What should you do if someone asks to use your government issued mobile device (phone/laptop..etc)? It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. It is your responsibility as an employee to protect and conserve Government-owned or -leased property and vehicles and to use them only for authorized purposes. Government Furnished Equipment (GFE) (FAR Part 45) is equipment that is owned by the government and delivered to or made available to a contractor. Since the URL does not start with https, do not provide your credit card information. a. Only use a government-issued thumb drive to transfer files between systems. Refer the vendor to the appropriate personnel. Hostility or anger toward the United States and its policies. What should be your response? Which of the following is true of the Common Access Card (CAC)? Correct. Only friends should see all biographical data such as where Alex lives and works. Store classified data appropriately in a GSA-approved vault/container. Mark SCI documents appropriately and use an approved SCI fax machine. It is fair to assume that everyone in the SCIF is properly cleared. . (controlled unclassified information) Which of the following is NOT correct way to protect CUI? Which of the following is not a best practice to preserve the authenticity of your identity? A coworker is observed using a personal electronic device in an area where their use is prohibited. Government Furnished Equipment (GFE) ( FAR Part 45) is equipment that is owned by the government and delivered to or made available to a contractor. b. \text{Stockholders' Equity:}&&&\\ c. Nothing. Ensure that any cameras, microphones, and Wi-Fi embedded in the laptop are physically disabled.- Correct. Top Secret information could be expected to cause exceptionally grave damage to national security of disclosed. Which of the following best describes good physical security? Identification, encryption, and digital signature. a colleague enjoys playing videos games, regularly uses social media, and frequently forgets to secure her smartphone elsewhere before entering areas where it is prohibited. When would be a good time to post your vacation location and dates on your social networking website? Which of the following is true of Unclassified information? Controlled Unclassified Information: (Victim) Select the information on the data sheet that is protected health information (PHI). Setting weekly time for virus scan when you are not on the computer and it is powered off. How can you protect yourself from social engineering? c. Do not access website links in e-mail messages. % Always check to make sure you are using the correct network for the level of data. Write your password down on a device that only you access. What should you do? th Xe>_ The proper security clearance and indoctrination into the SCI program. What should be your response? (Malicious Code) A coworker has asked if you want to download a programmers game to play at work. endstream endobj 1069 0 obj <>/Metadata 18 0 R/Pages 1066 0 R/StructTreeRoot 22 0 R/Type/Catalog/ViewerPreferences 1083 0 R>> endobj 1070 0 obj <>/MediaBox[0 0 842.04 595.32]/Parent 1066 0 R/Resources<>/Font<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI]>>/Rotate 0/StructParents 0/Tabs/S/Type/Page>> endobj 1071 0 obj <>stream **Classified Data How should you protect a printed classified document when it is not in use? In addition to avoiding the temptation of greed to betray his country, what should Alex do differently? They provide guidance on reasons for and duration of classification of information. *Sensitive Compartmented Information What is Sensitive Compartmented Information (SCI)? What type of attack might this be? What should you do? Hostility or anger toward the United States and its policies. Make note of any identifying information and the website URL and report it to your security office. The watermark names the person who will assess the proposal, along with the date and time it was downloaded. Do not access website links in e-mail messages. If authorized, what can be done on a work computer? You have accepted additional cookies. Which of the following is NOT an example of Personally Identifiable Information (PII)? What is the best course of action? (Malicious Code) What are some examples of removable media? Individuals must avoid referencing derivatively classified reports classified higher than the recipient.??? Software that installs itself without the user's knowledge. What is required for an individual to access classified data? a. Label all files, removable media, and subject headers. A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI________. A colleague enjoys playing video games online, regularly use social media, and frequently forgets to secure her smartphone elsewhere before entering areas where it is prohibited. (controlled unclassified information) Which of the following is NOT an example of CUI? It would be best to contact the institution using verified contact information to confirm. *Sensitive Compartmented Information What is a Sensitive Compartmented Information (SCI) program? Updated DASA Terms and Conditions - including new contract and intellectual property guidance. Refer the reporter to your organizations public affairs office. Your favorite movie. Correct. Which of the following personally-owned computer peripherals is permitted for use with Government-furnished equipment? Lionel stops an individual in his secure area who is not wearing a badge. In addition to the guidance on this page you must refer to the relevant competition document for the competition specific terms and conditions, including the specific contract. Verify the identity of all individuals.??? Damage b. How many potential insider threat indicators does this employee display? The Town and Country Planning (Use Classes) Order 1987 ( as amended) puts uses of land and buildings into various categories known as 'Use Classes' which are detailed below. Examples are: Patient names, Social Security numbers, Drivers license numbers, insurance details, and birth dates. How should you respond? Ask the individual to see an identification badge. What should you do? What should Sara do when using publicly available Internet, such as hotel Wi-Fi? Verified answer. Unauthorized Disclosure of Classified Information for DoD, Security Awareness: Derivative Classification Answers, CITI Ethics, Responsible Conduct, RCR, Law, HTH And IRB Answers, Level 1 Antiterrorism Awareness Training Pretest And Post Test Answers, EVERFI Achieve Consumer Financial Education Answers, Security Pro: Chapter 3 (3.1.8) & 4.1 Security Policies Answers, CITI Module #3 Research in Public Elementary and Secondary Schools, Answers to CTS Unit 7 Lab 7-2: Protocols and Services SNMP, Google Analytics Individual Qualification Exam Answers, Everfi Module 4 Credit Scores Quiz Answers, Which Of The Following Is Not Considered A Potential Insider Threat Indicator. *Spillage What should you do if you suspect spillage has occurred? A personally owned device approved under Bring Your Own Approved Device (BYOAD) policy must be unenrolled while out of the country. How many potential insider threat indicators does this employee display? As a best practice, labeling all classified removable media and considering all unlabeled removable media as unclassified. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. **Social Networking Which of the following is a security best practice when using social networking sites? On a computer at the public library to check your DOD email.D. A pop-up window that flashes and warns that your computer is infected with a virus. This bag contains your government-issued laptop. Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. How many potential insider threat indicators is Bob displaying? Submission Service reopen dates published. correct. correct. (IRS-defined) Use of Government Furnished Equipment (GFE) phones and GFE MiFi's/Hot-Spots for remote access to IRS IT assets (e.g., networks, systems) shall be provided through an encryption mechanism such as a . **Social Networking When is the safest time to post details of your vacation activities on your social networking website? hb```F3,oFRe@]Xp6)(ndfaP 1Hs30ka`tj l> Others may be able to view your screen. Each Form 388 must be signed and returned with a brief curriculum vitae (CV) of each person by the nominated individual completing the work. Never use personal e-mail accounts for transmitting PII. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. A trusted friend in your social network posts a link to vaccine information on a website unknown to you. Use the classified network for all work, including unclassified work. When using mobile computing devices, including laptops and cell phones, in public: Be careful of information visible on your mobile computing device; consider screen protection Maintain possession of laptop and other government-furnished equipment (GFE) at all times and be extra vigilant in protecting it Protect your mobile computing device Neither confirm or deny the information is classified. a. PII includes, but is not limited to, social security numbers, date and places of birth, mothers maiden names, biometric records, and PHI. Only documents that are classified Secret, Top Secret, or SCI require marking. Victim You must appoint a person whos responsible for all communications with us. \hline Do not download it. Transmit classified information via fax machine only Not correct Immediately notify your security point of contact. <>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/MediaBox[ 0 0 612 792] /Contents 4 0 R/Group<>/Tabs/S/StructParents 0>> **Use of GFE When can you check personal e-mail on your Government-furnished equipment (GFE)? Store classified data appropriately in a GSA-approved vault/container. What should you do to protect classified data? What should the employee do differently? Decline to let the person in and redirect her to security. Decisions to provide GFE must be identified and a comparison made of the cost difference between using GFE or CFE. HHS published the HHS Memorandum: the Use of Government Furnished Equipment during Foreign Travel. Which of the following is true about telework? What should you do? Understanding and using the available privacy settings. Tell us about it through the REPORT button at the bottom of the page. be wary of suspicious e-mails that use your name and/or appear to come from inside your organization. a. Sally stored her government-furnished laptop in her checked luggage using a TSA approved luggage lock. This short and simple contracting method aims to encourage engagement with DASA, whilst having the complexities of some other contracting methods removed. Any information, products, services or hyperlinks contained within this website does not constitute any type of endorsement by the DoD, Air Force, Navy or Army. endstream endobj 1075 0 obj <>stream a. CUI may be stored on any password-protected system b. CUI may be stored in a locked desk after working hours c. CUI may be emailed if encrypted. You can decide how often to receive updates. economics. Intellectual Property in the ISC is in most cases managed according to the MOD standard intellectual property contract condition for fully funded research contracts DEFCON 705. After you have returned home following the vacation. (Sensitive Compartmented Information) What portable electronic devices (PEDs) are allow in a Secure Compartmented Information Facility (SCIF)? *Sensitive Information Under what circumstances could classified information be considered a threat to national security? Classified Data: (Incident) What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? Which of the following is true of the Common Access Card (CAC)? Spillage occurs when information is spilled from a higher classification or protection level to a lower classification or protection level. Which of the following actions is appropriate after finding classified Government information on the internet? A colleague asks to leave a report containing protected health information (PHI) on his desk overnight so he can continue working on it the next day. The website requires a credit card for registration. Use a single, complex password for your system and application logons. Then select Submit. Name and profile picture - Any Malicious Code (Prevalence): Which of the following is an example of malicious code? Store classified data in a locked desk drawer when not in use Maybe Only expressly authorized government-owned PEDs. Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI. all non-redacted elements of the final terms and conditions, all non-redacted elements of the contract schedules. Which of the following attacks target high ranking officials and executives? (Spillage) What should you do when you are working on an unclassified system and receive an email with a classified attachment? Correct. Controlled unclassified information. No more than 6 interim payments are to be proposed. What security risk does a public Wi-Fi connection pose? Which of the following is NOT considered sensitive information? endobj How should you securely transport company information on a removable media? Which of the following is NOT Protected Health Information (PHI)? In providing Government Property to a Contractor the Contracting Officer must also make sure that a Contractor is not given an unfair competitive advantage over another Contractor who may not have Government Property. Porton Down A coworker removes sensitive information without approval. **Insider Threat Which of the following should be reported as a potential security incident? Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. A vendor conducting a pilot program with your organization contacts you for organizational data to use in a prototype. The popup asks if you want to run an application. How do you respond? the whistleblower protection enhancement act relates to reporting. You know this project is classified. Secure it to the same level as Government-issued systems. Using unauthorized software. *Sensitive Compartmented Information When faxing Sensitive Compartmented Information (SCI), what actions should you take? Illegal downloading copyrighted materials. Unclassified documents do not need to be marked as a SCIF. b. Download the information. _I`vm `V k\Up k[t]I*+oDa,~v0j:g5wVoLQ:@n-62.Sm-"z.Z~-C-K8Yt_@}aVa{]ppwB6#fR4,r\+ l-sZO15 What is a best practice to protect data on your mobile computing device? The following practices help prevent viruses and the downloading of malicious code except. If you participate in or condone it at any time. Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)? You must have your organization's permission to telework. Which of the following is true of protecting classified data? (Spillage) Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. See PGI 245.103-72, Government- furnished property (GFP) attachments to solicitations and awards. Avoid attending professional conferences. Storage devices (e.g., USB memory sticks, hard drives, etc.) *Sensitive Information What type of unclassified material should always be marked with a special handling caveat? correct. **Classified Data Which of the following is true of protecting classified data? A coworker has asked if you want to download a programmers game to play at work. When may you be subject to criminal, disciplinary, and/or administrative action due to online harassment, bullying, stalking, hazing, discrimination, or retaliation? ideas from within Government (excluding Public Sector Research Establishments (PSREs). Appropriate confidentiality agreements will be put in place. Its a condition of the contract that, as certain work must be justified ethically as well as scientifically, we reserve the right to terminate the work with immediate effect if you dont gain the relevant approval. Which of the following is NOT a criterion used to grant an individual access to classified data? (Malicious Code) Which email attachments are generally SAFE to open? It contains certificates for identification, encryption, and digital signature. What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? **Website Use Which of the following statements is true of cookies? Correct. Which of the following statements is true of cookies? c. Allowing hackers access. 1101 0 obj <>stream The determination of GFE is usually made by the government Program Manager (PM) and Contracting Officer. Prices quoted are not subject to the effects of escalation or exchange-rate variation. When is it appropriate to have your security badge visible? (Spillage) What should you do if a reporter asks you about potentially classified information on the web? Controlled Unclassified Information: (Incident) Which of the following is NOT a correct way to protect CUI? not correct tell your colleague that it needs to be secured in a cabinet or container. A coworker has left an unknown CD on your desk. Which of the following is true of Controlled Unclassified information (CUI)? Nothing. This must include the overall price, but not a breakdown of the pricing structure if that detailed information can be redacted under the Freedom of Information Act. Since the URL does not start with https, do not provide you credit card information. Which of the following is a reportable insider threat activity? What should be done to protect against insider threats? What is the danger of using public Wi-Fi connections? endstream endobj 1076 0 obj <>stream When traveling or working away from your main location, what steps should you take to protect your devices and data? 0-`*0r+u,1+~p]"WC0`=0uG!o8zGkv57?8/ssmZ]bw>V3^aiKPH(pUcWqR)u KmPy (TL2 relates to reporting of gross mismanagement and/or abuse of authority. The interim payment plan must provide clearly defined work stages, deliverables with associated payments and timescales. We thoroughly check each answer to a question to provide you with the most correct answers. DASA submissions are welcome from the private sector, academia, individuals (i.e. shall not modify, cannibalize, or make alterations to U.S. Forest Service property. Firewall disabled. Information should be secured in a cabinet or container while not in use. **Classified Data Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? You are having lunch at a local restaurant outside the installation, and you find a cd labeled favorite song. 1304). How are Trojan horses, worms, and malicious scripts spread? On Jan. 30, 2023, President Joe Biden announced that the COVID-19 public health emergency (PHE) will end May 11, 2023. Classified information that should be unclassified and is downgraded. Lionel stops an individual in his secure area who is not wearing a badge. Its classification level may rise when aggregated. What should you do? Which designation marks information that does not have potential to damage national security?
Best Makeout Spots On Long Island, Garmin Explore App Vs Earthmate App, Sunderland Royal Hospital Consultants, Articles P