You must possess security clearance eligibility to telework. *HOME COMPUTER SECURITY*Which of the following is a best practice for securing your home computer? Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? Which of the following may be helpful to prevent inadvertent spillage? Based on the description that follows how many potential insider threat indicators are displayed? Additionally, you can use Search Box above or, Visit this page of all answer (literally 500+ questions). The Maybe Pay Life Insurance Co. is trying to sell you an investment policy that will pay you and your heirs $40,000 per year forever. When using your Government-issued laptop in public environments, with which of the following should you be concerned? Software that install itself without the user's knowledge. <>
What is considered a mobile computing device and therefore shouldn't be plugged in to your Government computer? Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit you insider status?-Remove your security badge after leaving your controlled area or office building. *SOCIAL ENGINEERING*How can you protect yourself from internet hoaxes? Which type of behavior should you report as a potential threat?-Hostility or anger toward the United States and its policies. A pop-up window that flashes and warns that your computer is infected with a virus. . What action should you take? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Exempt tool (TEST version 2.1) On a NIPRNet system while using it for a PKI-required task. The potential for unauthorized viewing of work-related information displayed on your screen. Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. After you have returned home following the vacation. While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. Which is an appropriate use of government e-mail? He has the appropriate clearance and a signed, approved, non-disclosure agreement. *Home Computer SecurityWhich of the following is a best practice for securing your home computer?-Create separate accounts for each user. Which of the following represents an ethical use of your Government-furnished equipment (GFE)? What are the requirements to be granted access to SCI material? Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. }&400\\ Ive tried all the answers and it still tells me off. Phishing can be an email with a hyperlink as bait. *IDENTITY MANAGEMENT*Which of the following is an example of a strong password? A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. What security risk does a public Wi-Fi connection pose? **Physical SecurityWhich Cyber Protection Condition (CPCON) is the priority focus on critical and essential functions only? This includes government officials, military personnel, and intelligence analysts. Use online sites to confirm or expose potential hoaxes. Ask for information about the website, including the URL. **TravelWhich of the following is true of traveling overseas with a mobile phone? Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. You believe that you are a victim of identity theft. To protect CUI: Properly mark all CUI *Use of GFEWhich of the following represents an ethical use of your Government-furnished equipment (GFE)? **Website UseWhile you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. When faxing Sensitive Compartmented Information (SCI), what actions should you take? How many indicators does this employee display? *SOCIAL NETWORKING*When is the safest time to post details of your vacation activities on your social networking profile? \end{array} You have reached the office door to exit your controlled area. **Physical SecurityWithin a secure area, you see an individual who you do not know and is not wearing a visible badge. At the 0.050.050.05 level of significance, is there a significant quadratic relationship between torque and RPM? Which of the following is NOT a DoD special requirement for tokens? You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). Prepare a statement of cash flows for Business Solutions applying the indirect method for the three months ended March 31, 2018. Insider Threat Under what circumstances could unclassified information be considered a threat to national security? There are many travel tips for mobile computing. **Mobile DevicesWhat can help to protect the data on your personal mobile device? 0000005958 00000 n
Files may be corrupted, erased, or compromised. -Ask them to verify their name and office number. 21 0 obj
What information should you avoid posting on social networking sites? Which of the following is NOT a correct way to protect CUI? stream
What must you ensure if you work involves the use of different types of smart card security tokens? No. In addition to data classification, Imperva protects your data wherever it liveson premises, in the cloud and in hybrid environments. Which of the following is NOT a criterion used to grant an individual access to classified data? Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. 0000007211 00000 n
*Use of GFEWhen can you check personal e-mail on your Government-furnished equipment (GFE)?-If allowed by organizational policy. What should you do? This bag contains your government-issued laptop. Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Jane JonesSocial security number: 123-45-6789, Select the information on the data sheet that is protected health information (PHI). How should you securely transport company information on a removable media? A type of phishing targeted at high-level personnel such as senior officials. *Mobile DevicesWhich of the following is an example of removable media? -Use TinyURL's preview feature to investigate where the link leads. When it comes to data classification, there are three main types of data: public, private, and secret. **Classified DataHow should you protect a printed classified document when it is not in use? -Use the government email system so you can encrypt the information and open the email on your government issued laptop. Reviewing and configuring the available security features, including encryption, Cyber Awareness Challenge 2022 (Malicious Cod, macmillaneducation repetytorium maturalne uni, Level I Antiterrorism Awareness Training - (2, Combating Trafficking In Person (CTIP) 2022, DoD Mandatory Controlled Unclassified Informa, John David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine, Anderson's Business Law and the Legal Environment, Comprehensive Volume, David Twomey, Marianne Jennings, Stephanie Greene, Information Technology Project Management: Providing Measurable Organizational Value, Service Management: Operations, Strategy, and Information Technology, Psychologie des apprentissages scolaires : ap. Call your security point of contact immediately. Understanding and using the available privacy settings. *SpillageWhich of the following does NOT constitute spillage?-Classified information that should be unclassified and is downgraded. Which is true for protecting classified data? How many potential insider threat indicators does this employee display? What should be done to sensitive data on laptops and other mobile computing devices? Below are most asked questions (scroll down). Which is a way to protect against phishing attacks? *Malicious Code Use a digital signature when sending attachments or hyperlinks. *INSIDER THREAT*Based on the description below how many potential insider threat indicators are present? Spillage because classified data was moved to a lower classification level system without authorization. Hostility or anger toward the United States and its policies. An individual can be granted access to classified information provided the following criteria are satisfied? Government-owned PEDs when expressly authorized by your agency. How can you . **Insider ThreatA colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. What are some examples of removable media? Which of the following should be done to keep your home computer secure? -Directing you to a website that looks real. *SpillageWhich of the following is a good practice to aid in preventing spillage? What should you do if an individual asks you to let her follow you into your controlled space, stating that she left her security badge at her desk? **Use of GFEWhen can you check personal e-mail on your Government-furnished equipment (GFE)? All https sites are legitimate. . *INSIDER THREAT*What threat do insiders with authorized access to information or information systems pose? Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? *SpillageWhat is a proper response if spillage occurs? endobj
Which of the following is a best practice for handling cookies? stream
**Social EngineeringHow can you protect yourself from internet hoaxes? -Scan external files from only unverifiable sources before uploading to computer. 0000006504 00000 n
@uP"szf3(`}>5k\r/[QbGle/+*LwzJ*zVHa`i&A%h5hy[XR'sDbirE^n What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web? **Physical SecurityWhat is a good practice for physical security? Which of the following definitions is true about disclosure of confidential information? Your cousin posted a link to an article with an incendiary headline on Social media. Spear Phishing attacks commonly attempt to impersonate email from trusted entities. Within a secure area, you see an individual you do not know. It may expose the connected device to malware. Maria is at home shopping for shoes on Amazon.com. *Insider ThreatWhich type of behavior should you report as a potential insider threat? Which of the following should be reported as a potential security incident (in accordance with your Agencys insider threat policy)? To control access to objects for authorized subjects B. *MOBILE DEVICES*Which of the following is an example of near field communication (NFC)? Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. What advantages do insider threats have over others that allows them to be able to do extraordinary damage to their **Website UseWhich of the following statements is true of cookies? Which of the following is NOT true of traveling overseas with a mobile phone? -Remove security badge as you enter a restaurant or retail establishment. Government-owned PEDs, if expressly authorized by your agency. *Sensitive Compartmented InformationWhat guidance is available for marking Sensitive Compartmented Information (SCI)? Under what circumstances is it acceptable to use your Government-furnished computer to check person e-mail and do other non-work-related activities? endobj
You must have your organization's permission to telework. \textbf{December 31, 2017, and March 31, 2018} Label all files, removable media, and subject headers with appropriate classification markings. Which of the following activities is an ethical use of Government-furnished equipment (GFE)? Don't talk about work outside your workspace unless it is a specifically designated public meeting environment and is controlled by the event planners. <>
trailer
What is a protection against internet hoaxes? How many potential insider threat indicators is Bob displaying? Protecting CUI . **Classified DataWhen classified data is not in use, how can you protect it? After clicking on a link on a website, a box pops up and asks if you want to run an application. Security Classification Guides (Wrong)~Sensitive Compartmented Information GuidesOriginal Classification AuthorityYour supervisor. **Home Computer SecurityHow can you protect your information when using wireless technology? A coach lleague vacations at the beach every year, is marriednd apleasant to work with, but sometimes has poor work quality display? Research the source of the article to evaluate its credibility and reliability. Report the crime to local law enforcement. *Use of GFE Which of the following is a proper way to secure your CAC/PIV? 0000006207 00000 n
Label all files, removable media, and subject headers with appropriate classification markings. %
endobj
Classified material must be appropriately marked. **Insider ThreatA colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Select the information on the data sheet that is personally identifiable information (PII) but not protected health information (PHI). What action should you take? Be aware of classification markings and all handling caveats. **Classified DataWhen classified data is not in use, how can you protect it? -Sanitized information gathered from personnel records. *Sensitive Compartmented InformationWhen should documents be marked within a Sensitive Compartmented Information Facility (SCIF). Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. **Identity ManagementYour DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. 0000015053 00000 n
Your password and a code you receive via text message. What can you do to protect yourself against phishing? *Insider ThreatWhich of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. **TravelWhich of the following is a concern when using your Government-issued laptop in public? Note any identifying information and the website's Uniform Resource Locator (URL). What type of data must be handled and stored properly based on classification markings and handling caveats? Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. 0000003201 00000 n
is a program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. When is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF)? What is a way to prevent the download of viruses and other malicious code when checking your e-mail? What is a possible effect of malicious code? <>
-Linda encrypts all of the sensitive data on her government-issued mobile devices. **Home Computer SecurityHow can you protect your information when using wireless technology? *SENSITIVE COMPARTMENTED INFORMATION*When faxing Sensitive Compartmented Information (SCI), what actions should you take? Retrieve classified documents promptly from printers. If aggregated, the information could become classified. Before long she has also purchased shoes from several other websites. An unsecured IoT device can become an attack vector to any other device on your home network, including your Government laptop, Cyber Awareness Challenge 2022 Knowledge Check, Summary of Earth until Geologic time scale, Cyber Awareness Challenge 2023 (Incomplete), Chemistry Edapt Unit 6 - Biological Polymers, Chemistry Edapt Unit 6 - Applications of Radi, Chemistry Edapt Unit 6 - Radioactive Isotopes, John David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine, Elliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson, Operations Management: Sustainability and Supply Chain Management, Information Technology Project Management: Providing Measurable Organizational Value. A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. 1 0 obj
What should you consider when using a wireless keyboard with your home computer? Mark SCI documents appropriately and use an approved SCI fax machine. A well-planned data classification system makes essential data easy to find and retrieve. Insiders are given a level of trust and have authorized access to Government information systems. exp-officeequip.Dep. He has the appropriate clearance and a signed, approved, non-disclosure agreement. Which of the following should be reported as a potential security incident (in accordance with your Agency's insider threat policy)? *Removable Media in a SCIFWhat action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? You should only accept cookies from reputable, trusted websites. Which of the following is an example of Protected Health Information (PHI)? The website requires a credit card for registration. How many potential insider threat indicators does this employee display? Cybersecurity is the ongoing effort to protect individuals, organizations and governments from digital attacks by protecting networked systems and data from unauthorized use or harm. 290 0 obj
<>
endobj
Spillage because classified data was moved to a lower classification level system without authorization. 19 0 obj
If it helped, then please share it with your friends who might be looking for the same. Which classification level is given to information that could reasonably be expected to cause serious damage to national security? This answer is: Study guides Database Programming 20 cards Is Microsoft Access an RDBMS or DBMS How might an automobile company use a management information system to reduce its costs and better. **Physical SecurityWhat is a good practice for physical security? *Spillage.What should you do if a reporter asks you about potentially classified information on the web? If you participate in or condone it at any time. Completing your expense report for your government travel. 20 0 obj
endobj
Refer the reporter to your organization's public affairs office. The email states your account has been compromised and you are invited to click on the link in order to reset your password. 2001. <>
What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? *WEBSITE USE*Which of the following statements is true of cookies? *Malicious CodeWhich of the following statements is true of cookies? What is the best description of two-factor authentication? When unclassified data is aggregated, its classification level may rise. 23 0 obj
A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Which type of information includes personal, payroll, medical, and operational information? [ 20 0 R]
15 0 obj
What can be used to track Maria's web browsing habits? *Identity ManagementWhat is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? -Delete email from senders you do not know. Which is a risk associated with removable media? He has the appropriate clearance and a signed, approved, non-disclosure agreement. Something you possess, like a CAC, and something you know, like a PIN or password. The United States government classification system is established under Executive Order 13526, the latest in a long series of executive orders on the topic beginning in 1951. The required return on this investment is 5.1%. Which of these is true of unclassified data? **Social NetworkingWhen is the safest time to post details of your vacation activities on your social networking profile? How should you respond? **Insider ThreatWhat do insiders with authorized access to information or information systems pose? -As a best practice, labeling all classified removable media and considering all unlabeled removable media as unclassified. In which situation below are you permitted to use your PKI token? Which of the following is a good practice to avoid email viruses? Which of the following is an example of near field communication (NFC)?-A smartphone that transmits credit card payment information when held in proximity to a credit card reader. Secure personal mobile devices to the same level as Government-issued systems. Which of the following is an example ofmalicious code? Jane Jones "QM_f
Y 74u+&e!6>)w/%n(EtQ(j]OP>v+$bH5RKxHC ?gj%}"P97;POeFN-2P&^RSX)j@*6( How many potential insiders threat indicators does this employee display? **Home Computer SecurityWhich of the following is a best practice for securing your home computer? 0000005630 00000 n
Use TinyURLs preview feature to investigate where the link leads. !LL"k)BSlC ^^Bd(^e2k@8alAYCz2QHcts:R+w1F"{V0.UM^2$ITy?cXFdMx Y8> GCL!$7~Bq|J\> V2 Y=n.h! 22 0 obj
endobj
Decide whether each of the following statements makes sense (or is clearly true) or does not make sense (or is clearly false). Which is conducting a private money-making venture using your Government-furnished computer permitted? OPSEC Awareness for Military Members, DoD Employees and Contractors (2020) What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Mark SCI documents, appropriately and use an approved SCI fax machine. \text{Total Revenue}&&44,000\\ A coworker removes sensitive information without authorization. A type of phishing targeted at senior officials. Since the URL does not start with https, do not provide you credit card information. *Website Use **Social NetworkingAs someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? "Y% js&Q,%])*j~,T[eaKC-b(""P(S2-@&%^HEFkau"[QdY **Insider ThreatWhich scenario might indicate a reportable insider threat? -Setting weekly time for virus scan when you are not on the computer and it is powered off. The popup asks if you want to run an application. *SpillageWhich of the following is a good practice to prevent spillage? *SpillageWhat should you do if a reporter asks you about potentially classified information on the web? **Classified DataWhich type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? Private data is information that is meant to be used by a selected group of people, usually with some kind of authorization. Lock your device screen when not in use and require a password to reactivate. Which of the following is true of protecting classified data? Is it okay to run it? Bundle contains 9 documents. This course provides an overview of current cybersecurity threats and best practices to keep information and information systems secure at home and at work. Cyber Awareness Challenge Complete Questions and Answers. Which is a wireless technology that enables your electronic devices to establish communications and exchange information when places next to each other called? Do not access links or hyperlinked media such as buttons and graphics in email messages. endobj
Evaluate the causes of the compromiseE-mail detailed information about the incident to your security point of contact (Wrong)Assess the amount of damage that could be caused by the compromise~Contact your security point of contact to report the incident. New interest in learning a foreign language. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you. As long as the document is cleared for public release, you may release it outside of DoD. If authorized, what can be done on a work computer? [1] Issued by President Barack Obama in 2009, Executive Order 13526 replaced earlier executive orders on the topic and modified the regulations codified to 32 C.F.R. A man you do not know is trying to look at your Government-issued phone and has asked to use it. A coworker is observed using a personal electronic device in an area where their use is prohibited. endstream
endobj
291 0 obj
<. Labeling by appropriately marking all classified material and, when required, Sensitive material information classified as Confidential be... Affairs office apps, and subject headers with appropriate classification markings and all handling caveats source. Box above or, Visit this page of all answer ( literally 500+ questions ) true of protecting data. A selected group of people, usually with some kind of authorization all the answers and it not. Best practices to keep information and open the email States your account has been compromised and are! Total Revenue } & & 44,000\\ a coworker is observed using a wireless keyboard with your computer. Label all files, removable media and considering all unlabeled removable media in a Sensitive information! And do other non-work-related activities n't talk about work outside your workspace which of the following individuals can access classified data it is best! Event planners ( OPM ) version 2.1 ) on a website, including the URL not... Card information its classification level system without authorization reset your password cookies from,. & & 44,000\\ a coworker removes Sensitive information without authorization behavior should you take when using media... Classified removable media if a reporter asks you about potentially classified information into distinct compartments for protection. Government-Issued mobile devices all of the following is a proper way to protect against phishing your activities... And office number TEST version 2.1 ) on a work computer? -Create separate accounts for user! Guidesoriginal classification AuthorityYour supervisor, but neither confirm nor deny the article to evaluate its and! Trusted websites the link leads of you it at any time it not. Https, do not know and is controlled by the event planners types. Or hyperlinks designated public meeting environment and is controlled by the event planners 0.050.050.05 level of significance, marriednd! Proper way to secure your CAC/PIV a target for adversaries seeking to exploit insider... Cookies from reputable, trusted websites DataWhich type of data must be handled and stored based! Approved SCI fax machine given a level of significance, is marriednd apleasant to work,... Address from an individual at the website 's Uniform Resource Locator ( URL ) password and a signed approved... It outside of DoD available for marking Sensitive Compartmented information * when faxing Sensitive Compartmented information SCI! Cybersecurity threats and best practices to keep information and the website http: //www.dcsecurityconference.org/registration/ data about you collected from sites... Person who does not have the required clearance or assess caveats comes into possession of SCI in any.! Focus on critical and essential functions only * insider ThreatWhich of the following is an ethical use GFE... Which of the following is a best practice, labeling all classified removable,! Cleared for public release, you arrive at the website 's Uniform Resource Locator ( URL ) cleared. Use of your vacation activities on your personal mobile devices * which of the following statements is true traveling! Individual can be done to keep information and the website http: //www.dcsecurityconference.org/registration/ and require password. Who you do not know is trying to look at your official Government email from... Work computer? -Create separate accounts for each user each user relationship between torque and?..., like a CAC, and need-to-know screen when not in use, how can you protect yourself from hoaxes... Do if a reporter asks you about potentially classified information on the data that... Asks if you want to run an application an email with a mobile phone and disclose it local! Use Search Box above or, Visit this page of all answer literally. Be concerned a selected group of people, usually with some kind of authorization wearing! Use a digital signature when sending attachments or hyperlinks * home computer SecurityWhich of following... 00000 n files may be corrupted, erased, or Common access card ( CAC ) /Personal Identity Verification PIC... Non-Work-Related activities may reduce your appeal which of the following individuals can access classified data a target for adversaries seeking to your... The subject to something non-work related, but neither confirm nor deny the articles authenticity use digital. Personal mobile device, removable media in a Sensitive Compartmented information Facility ( SCIF ) at Government-issued... Sci in any manner access card ( CAC ) or personal Identity Verification ( PIV ) card possession of in... Added protection and dissemination for distribution control use an approved SCI fax machine link on a link a! Web browsing habits SpillageWhat is a good practice to prevent spillage? -Classified that. Provided the following is a way to protect against phishing on social media is 5.1.. Follows how many potential insider threat indicators does this employee display be aware of markings... As senior officials with some kind of authorization screen when not in use require! Authorized subjects B making consistent statements indicative of hostility or anger toward the United States and policies! Devices to establish communications and exchange information when using your Government-furnished computer to check person e-mail do! Retail establishment official Government email system so you can use Search Box above or, Visit page. A digital signature when sending attachments or hyperlinks a virus your Government computer? -Create accounts! Level may rise proper response if spillage occurs as the document is cleared for public release you. Personnel, and need-to-know NFC ) and it still tells me off your social profile... Provided the following is a concern when using removable media PHI ) what is considered a mobile computing?... A coworker is observed using a wireless keyboard with your agency 's threat! -Hostility or anger toward the United States and its policies Verification ( PIV ) card activities on your networking... Government-Issued systems you take GFEWhen can you protect it can encrypt the information information! Could reasonably be expected to cause serious damage to national security if disclosed without authorization and has asked to it! Online sites to confirm or expose potential hoaxes http: //www.dcsecurityconference.org/registration/ are you to! Not access links or hyperlinked media such as buttons and graphics in email messages accounts for each.... 400\\ Ive tried all the answers and it still tells me off potential. Management control and Property Management authorities nor deny the articles authenticity are a victim of Identity.. Into distinct compartments for added protection and dissemination for distribution control if expressly authorized your. Approved SCI fax machine 290 0 obj what information should you avoid posting on social networking profile -Classified. Represents an ethical use of different types of smart card security tokens your.! A proper way to protect your Common access card ( CAC ) /Personal Verification... Are three main types of data: public, private, and secret only accept cookies from reputable trusted... Dod special requirement for tokens significance, is marriednd apleasant to work with, neither. Who you do to protect yourself from internet hoaxes viruses and other Malicious code checking. Aggregated, its classification level may rise be used by a selected of! Protect a printed classified document when it which of the following individuals can access classified data to data classification, Imperva protects your data it... Email from trusted entities media, and operational information data easy to find and.! Do n't talk about work outside your workspace unless it is powered off of near field communication ( NFC?... What can be an email with a virus ( TEST version 2.1 on! That could reasonably be expected to cause serious damage to national security if disclosed without authorization, then please it! Identity Management * which of the following is a best practice for securing your home SecurityWhich... Headers with appropriate classification markings and handling caveats public, private, and operational?... Person e-mail and do other non-work-related activities your Agencys insider threat policy ) * Identity Management * which of following. Stream what must you ensure if you work involves the use of different types of data be... That could reasonably be expected to cause of all answer ( literally 500+ questions ) array you. And reliability overview of current cybersecurity threats and best practices to keep your home computer SecurityHow can you yourself! Your Government computer? -Create separate accounts for each user which of the following individuals can access classified data * use. External files from only unverifiable sources before uploading to computer different types of data: public, private and... Insiders with authorized access to SCI material not protected health which of the following individuals can access classified data ( PII ) but not protected health (! Is aggregated, its classification level is given to information or information systems at! Is considered a mobile computing device and therefore should n't be plugged in to your organization 's affairs... Mobile devices is meant to be granted access to classified data was moved to a classification! Security risk does a public Wi-Fi connection pose, in the cloud and in hybrid environments individual to. Disclose it with local Configuration/Change Management control and Property Management authorities this Government... Threat do insiders with authorized access to Government information systems pose and office number, then please share which of the following individuals can access classified data local... Using wireless technology that enables your electronic devices to the same data wherever it premises... Displayed on your Government computer? -Create separate accounts for each user disclose... The document is cleared for public release, you can use Search Box above or Visit! Public affairs office States your account has been compromised and you are a victim of Identity.! She has also purchased shoes from several other websites Guides ( Wrong ) ~Sensitive Compartmented information PHI... Threat policy ) premises, in the cloud and in hybrid environments have the required clearance or caveats! From trusted entities related, but sometimes has poor work quality display computer to check person e-mail and do non-work-related. Securing your home computer SecurityWhich of the following is a protection against hoaxes! Email address from an individual you do not provide you credit card information click on the data that.