Classified DVD distribution should be controlled just like any other classified media. Which of the following best describes the sources that contribute to your online identity. Ctrl+F (Cmd+F) will help you a lot when searching through such a large set of questions. A colleague vacations at the beach every year, is married and a father of four, sometimes has poor work quality, and works well with his team. How can you protect yourself from social engineering? A colleague saves money for an overseas vacation every year, is a single father, and occasionally consumes alcohol. At all times when in the facility c. At any time during the workday, including when leaving the facility. You are misusing a Government vehicle when you use it for your personal benefit as opposed to using it for the benefit of the Government. Government Furnished Assets (GFA) could be equipment, information or resources that are government-owned and loaned (on a free-of-charge basis) to a contractor to . Country A has a (n) ___ in the production of a good if it can produce the good at lower opportunity cost than country B . (Permitted Uses of Government-Furnished Equipment GFE)), Viewing or downloading pornography - No Your password and a code you receive via text message. When operationally necessary, owned by your organization, and approved by the appropriate authority. It wont be used for other purposes, without us having obtained the necessary rights and permissions to do so. HUj@}qDk. *Sensitive Compartmented Information Which must be approved and signed by a cognizant Original Classification Authority (OCA)? On a NIPRNET system while using it for a PKI-required task. *Sensitive Information Under what circumstances could classified information be considered a threat to national security? What is the best response if you find classified government data on the internet? You receive an inquiry from a reporter about government information not cleared for public release. Official websites use .govA If aggregated, the classification of the information may not be changed. Photos and videos you are in - Friends Only Avoid attending professional conferences. (Spillage) Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? (Sensitive Information) What certificates are contained on the Common Access Card (CAC)? Classified material must be appropriately marked b. hVo0W*$E*TG-%V$
%d|#I 1!=#"b$!'1Xr$8vG}z|C/B When your vacation is over, after you have returned home. What should the participants in this conversation involving SCI do differently? Total fixed cost equals $78,000 (includes fixed factory overhead and fixed selling and administrative expense). Which of the following is NOT a correct way to protect CUI? A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. **Use of GFE What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? Mobile devices and applications can track your location without your knowledge or consent. Store classified data appropriately in a GSA-approved vault/container. Avoid talking about work outside of the workplace or with people without a need-to-know, Report the suspicious behavior in accordance with their organization's insider threat policy. Transmit classified information via fax machine only Not correct Of the following, which is NOT a characteristic of a phishing attempt? GFAE: Government-Furnished Aeronautical Equipment. Which of the following is true of using DoD Public key Infrastructure (PKI) token? Follow procedures for transferring data to and from outside agency and non-Government networks. Personal information is inadvertently posted at a website. Throughout the life of any contract you must notify us in writing if you intend to change or add additional research workers. Many apps and smart devices collect and share your personal information and contribute to your online identity. What threat do insiders with authorized access to information or information systems pose? c. Only connect to known networks, Travel (Incident): What is the danger of using public Wi-Fi connections? Gambling online - No Security Classification Guides. What is the best course of action? Select Yes or No for each item. b. You are logged on to your unclassified computer and just received an encrypted email from a co-worker. GFE is normally specified in a Request for Proposal (RFP) or contract. Which of the following should be done to keep your home computer secure? Which of the following is true of the Common Access Card (CAC) or Personal Identity Verification (PIV) card? Balancesheetaccounts:AssetLiabilityStockholdersEquity:CapitalStockRetainedEarningsDividendsIncomestatementaccounts:RevenueExpenseIncreasCreditCredit(l)DecreaseDebitCreditCreditNormalBalanceDebitCreditCreditDebit. Which of the following is a security best practice for protecting Personally Identifiable Information (PII)? You receive an email from a company you have an account with. A program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. Mobile Devices (Incident): When is it okay to charge a personal mobile device using government-furnished equipment (GFE)? *Insider Threat Which of the following is a potential insider threat indicator? For Government-owned devices, use approved and authorized applications only. Birthday - Friends Only Which is NOT a method of protecting classified data? Dont include personal or financial information like your National Insurance number or credit card details. Effective 01/01/2021. Software that installs itself without the users knowledge, Malicious Code (Damage): How can malicious code cause damage? Then select Submit. Making unauthorized configuration changes - No. Not the websites URL. Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? View email in plain text and dont view email in Preview Pane. Only when there is no other charger available. A medium secure password has at least 15 characters and one of the following. Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? What is considered ethical use of the Government email system? In addition to avoiding the temptation of greed to betray his country, what should Alex do differently? Which of the following is a potential insider threat indicator? correct. \text{Income statement accounts:}&&&\\ A headset with a microphone through a Universal Serial Bus (USB) port. Refer the reporter to your organizations public affairs office. Connect to the Government Virtual Private Network (VPN). Purpose: This instruction memorandum (IM) provides . used in telework environments in accordance with reference (b). \text{Stockholders' Equity:}&&&\\ Decline to let the person in and redirect her to security. Government Furnished Equipment (GFE) - Devices and equipment that are purchased and funded by the NIH for use by NIH staff. Which of the following should you NOT do if you find classified information on the internet? Exceptionally grave damage. Conducting a private g*mbling online. Which of the following is NOT a criterion used to grant an individual access to classified data? correct. correct. What is an indication that malicious code is running on your system? Correct. Others may be able to view your screen. What actions should you take prior to leaving the work environment and going to lunch? Which of the following is not considered a potential insider threat indicator? **Mobile Devices What can help to protect the data on your personal mobile device? Who designates whether information is classified and its classification level? Retrieve classified documents promptly from printers. Correct. He let his colleague know where he was going, and he was coming right back. Contact the IRS using their publicly available, official contact information. *Sensitive Information Which of the following is the best example of Personally Identifiable Information (PII)? We reserve the right to add additional contractual conditions if individual circumstances dictate. What should be done to protect against insider threats? What is a best practice for protecting controlled unclassified information (CUI)? Use only personal contact information when establishing your personal account. *Spillage Which of the following is a good practice to aid in preventing spillage? Illegally downloading copyrighted material - No Calculate the margin of safety in terms of sales revenue. This HHS Policy supersedes the CMS ARS 3.0 CM-2 Enhancement 7 Configure Systems or Components for High Risk Areas control. All prices quoted for DASA proposals are firm (non-variable) and must be exclusive of VAT. Which is an untrue statement about unclassified data? Delete email. Correct. Darryl is managing a project that requires access to classified information. When using a fax machine to send sensitive information, the sender should do which of the following? endobj
b. What are some potential insider threat indicators? Which of the following is NOT an example of CUI? a. Individuals must avoid referencing derivatively classified reports classified higher than the recipient.??? We will make sure all proposals which are downloaded by us from our online submission service are appropriately classified and get a digital watermark. *Spillage .What should you do if a reporter asks you about potentially classified information on the web? At all times while in the facility. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? 7bqM8>EM3:N2/YX-4}Y>9> Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Which of the following is true of traveling overseas with a mobile phone? When using a public device with a card reader, only use your DoD CAC to access unclassified information, is only allowed if the organization permits it. **Classified Data What is required for an individual to access classified data? c. Do not access website links in e-mail messages. A Coworker has asked if you want to download a programmers game to play at work. What actions should you take with a compressed Uniform Resource Locator (URL) on a website known to you? New interest in learning another language, Which of the following is a good practice to protect classified information. d. All of these. On a computer displaying a notification to update the antivirus softwareB. Do not use any personally owned/non-organizational removable media on your organizations systems. A separate document, Form AD-107, must be completed to document the loan of U.S. Forest Service property. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Brainscape helps you realize your greatest personal and professional ambitions through strong habits and hyper-efficient studying. A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI________. Report the suspicious behavior in accordance with their organizations insider threat policy. Program Area: Property and Information Technology. What action should you take? How should you protect a printed classified document when it is not in use? Retrieve classified documents promptly from printers. Ive tried all the answers and it still tells me off, part 2. Which of the following must you do before using an unclassified laptop and peripherals in a collateral classified environment? Which of the following is true of Controlled Unclassified information (CUI)? *Sensitive Information What type of unclassified material should always be marked with a special handling caveat? Your favorite movie. Which of the following is true about URLs? c. Both of these, Use of GFE (Incident): Permitted Uses of Government-Furnished Equipment (GFE). Store it in a General Services Administration (GSA)-approved vault or container. Consider the various information sources listed previously in developing your answer. Mobile Devices (Incident): Which of the following demonstrates proper protection of mobile devices? Avoid talking about work outside of the workplace or with people without a need-to-know. Which of the following is a reportable insider threat activity? You must have your organizations permission to telework c. You may use unauthorized software as long as your computers antivirus software is up to date. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. It is permissible to release unclassified information to the public prior to being cleared. . Alex demonstrates a lot of potential insider threat indicators. For proposals that we fund, in accordance with the Governments Transparency Agenda, we are required to publish information in respect of Contract documents, comprising: In addition to the above, for proposals that we fund we will publish on DASA website your organisation name and type; DASA reference (ACCxxxxxx) and project title; and contract value. Correct. What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)? **Classified Data Which of the following is a good practice to protect classified information? *Spillage Which of the following may help to prevent spillage? *Spillage Which of the following actions is appropriate after finding classified information on the Internet? In providing Government Property to a Contractor the Contracting Officer must also make sure that a Contractor is not given an unfair competitive advantage over another Contractor who may not have Government Property. Physical Security: (Incident #2): What should the employee do differently? These are tangible items that the Contractor must manage and account for. Report the suspicious behavior in accordance with their organizations insider threat policy b. You have rejected additional cookies. **Home Computer Security How can you protect your information when using wireless technology? We use a number of safeguards to protect the information you provide to us in your proposals, whilst allowing proper scrutiny of your submissions by our expert assessors, facilitating effective collaboration, and achieving appropriate transparency of how public money is being spent. **Insider Threat Which of the following is NOT considered a potential insider threat indicator? endstream
endobj
1072 0 obj
<>stream
Spillage occurs when information is spilled from a higher classification or protection level to a lower classification or protection level. Looking for https in the URL. The following table summarizes the rules of debit and credit. How can you protect yourself on social networking sites? Any information, products, services or hyperlinks contained within this website does not constitute any type of endorsement by the DoD, Air Force, Navy or Army. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. To help with this, prices in your proposal must be supported by a full cost breakdown. Which of the following is a potential insider threat indicator? %%EOF
Updated DASA Terms and Conditions - including new contract and intellectual property guidance. Which of the following demonstrates proper protection of mobile devices? ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. Intellectual Property in the ISC is in most cases managed according to the MOD standard intellectual property contract condition for fully funded research contracts DEFCON 705. Have your permissions from your organization, follow your organization guideline, use authorized equipment and software, employ cyber security best practice, perform telework in dedicated when home. laptops, fitness bands, tablets, smartphones, electric readers, and Bluetooth devices. NON-MEDICAL NECESSITY COVERAGE AND PAYMENT RULES. Reviewing and configuring the available security features, including encryption. The watermark names the person who will assess the proposal, along with the date and time it was downloaded. *Sensitive Compartmented Information What must the dissemination of information regarding intelligence sources, methods, or activities follow? **Use of GFE Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? Use online sites to confirm or expose potential hoaxes, Follow instructions given only by verified personnel, Investigate the links actual destination using the preview feature, Determine if the software or service is authorized. GFA is not provided lightly and only where there are substantial and pressing reasons (e.g. Which of the following should you NOT do if you find classified information on the internet? *Social Networking After a contract has been awarded, all queries should be directed to the named points of contact detailed in the contract documentation. What level of damage to national security can you reasonably expect Top secret information to cause if disclosed? **Mobile Devices What should you do when going through an airport security checkpoint with a Government-issued mobile device? Chillmax Company plans to sell 3,500 pairs of shoes at $60 each in the coming year. Request the users full name and phone number. What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web? Which of the following individuals can access classified data? Label all files, removable media, and subject headers with appropriate classification markings. What should you do to protect yourself while on social networks? (Wrong). A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. Access requires a formal need-to-know determination issued by the Director of National Intelligence.? Which of the following is NOT an example of sensitive information? It is created or received by a healthcare provider, health plan, or employer. *Classified Data Which of the following is NOT a potential insider threat? Many apps and smart devices collect and share your personal information and contribute to your online identity. They can become an attack vector to other devices on your home network. Verified answer. Following instructions from verified personnel. Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Of the following, which is NOT an intelligence community mandate for passwords? When classified data is not in use, how can you protect it? Use the classified network for all work, including unclassified work. (Home computer) Which of the following is best practice for securing your home computer? This short and simple contracting method aims to encourage engagement with DASA, whilst having the complexities of some other contracting methods removed.