Podcast
Questions and Answers
How should you respond when a vendor conducting a pilot program contacts you for organizational data to use in a prototype?
How should you respond when a vendor conducting a pilot program contacts you for organizational data to use in a prototype?
Refer the vendor to the appropriate personnel.
How can you protect classified data when it is not in use?
How can you protect classified data when it is not in use?
Store classified data appropriately in a GSA-approved vault/container.
What is the basis for handling and storage of classified data?
What is the basis for handling and storage of classified data?
Classification markings and handling caveats.
Before using an unclassified laptop and peripherals in a collateral classified environment, what must you do?
Before using an unclassified laptop and peripherals in a collateral classified environment, what must you do?
Signup and view all the answers
What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed?
What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed?
Signup and view all the answers
What must you have to telework?
What must you have to telework?
Signup and view all the answers
What is true about protecting classified data?
What is true about protecting classified data?
Signup and view all the answers
What is a reportable insider threat activity?
What is a reportable insider threat activity?
Signup and view all the answers
Which scenario might indicate a reportable insider threat?
Which scenario might indicate a reportable insider threat?
Signup and view all the answers
Which of the following is a potential insider threat indicator? (Select all that apply)
Which of the following is a potential insider threat indicator? (Select all that apply)
Signup and view all the answers
What is the safest piece of information to include on your social media profile?
What is the safest piece of information to include on your social media profile?
Signup and view all the answers
What is true of many apps and smart devices?
What is true of many apps and smart devices?
Signup and view all the answers
How can you protect your organization on social networking sites?
How can you protect your organization on social networking sites?
Signup and view all the answers
What is a best practice for protecting Controlled Unclassified Information (CUI)?
What is a best practice for protecting Controlled Unclassified Information (CUI)?
Signup and view all the answers
How should Controlled Unclassified Information (CUI) be transmitted safely?
How should Controlled Unclassified Information (CUI) be transmitted safely?
Signup and view all the answers
Which designation includes Personally Identifiable Information (PII) and Protected Health Information (PHI)?
Which designation includes Personally Identifiable Information (PII) and Protected Health Information (PHI)?
Signup and view all the answers
Which of the following is NOT an example of CUI?
Which of the following is NOT an example of CUI?
Signup and view all the answers
Which of the following is NOT a correct way to protect CUI?
Which of the following is NOT a correct way to protect CUI?
Signup and view all the answers
What best describes good physical security?
What best describes good physical security?
Signup and view all the answers
What is an example of two-factor authentication?
What is an example of two-factor authentication?
Signup and view all the answers
What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card?
What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card?
Signup and view all the answers
What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)?
What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)?
Signup and view all the answers
What is true of Sensitive Compartmented Information (SCI)?
What is true of Sensitive Compartmented Information (SCI)?
Signup and view all the answers
Which of the following is NOT a potential consequence of using removable media unsafely in a SCIF?
Which of the following is NOT a potential consequence of using removable media unsafely in a SCIF?
Signup and view all the answers
What portable electronic devices (PEDs) are permitted in a SCIF?
What portable electronic devices (PEDs) are permitted in a SCIF?
Signup and view all the answers
What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF?
What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF?
Signup and view all the answers
Which of the following is NOT a type of malicious code?
Which of the following is NOT a type of malicious code?
Signup and view all the answers
What action can help to protect your identity?
What action can help to protect your identity?
Signup and view all the answers
What is an appropriate use of government e-mail?
What is an appropriate use of government e-mail?
Signup and view all the answers
What type of social engineering targets particular groups of people?
What type of social engineering targets particular groups of people?
Signup and view all the answers
How can you protect yourself from social engineering?
How can you protect yourself from social engineering?
Signup and view all the answers
What is true of traveling overseas with a mobile phone?
What is true of traveling overseas with a mobile phone?
Signup and view all the answers
What should Sara do when using publicly available Internet, such as hotel Wi-Fi?
What should Sara do when using publicly available Internet, such as hotel Wi-Fi?
Signup and view all the answers
What is the danger of using public Wi-Fi connections?
What is the danger of using public Wi-Fi connections?
Signup and view all the answers
Which personally-owned computer peripheral is permitted for use with Government-furnished equipment?
Which personally-owned computer peripheral is permitted for use with Government-furnished equipment?
Signup and view all the answers
How can you protect data on your mobile computing and portable electronic devices (PEDs)?
How can you protect data on your mobile computing and portable electronic devices (PEDs)?
Signup and view all the answers
Which of the following is an example of removable media?
Which of the following is an example of removable media?
Signup and view all the answers
What is true of Internet of Things (IoT) devices?
What is true of Internet of Things (IoT) devices?
Signup and view all the answers
When is it appropriate to have your security badge visible?
When is it appropriate to have your security badge visible?
Signup and view all the answers
What should the owner of printed SCI do differently?
What should the owner of printed SCI do differently?
Signup and view all the answers
What should the participants in a conversation involving SCI do differently?
What should the participants in a conversation involving SCI do differently?
Signup and view all the answers
Which demonstrates proper protection of mobile devices?
Which demonstrates proper protection of mobile devices?
Signup and view all the answers
Which of the following does NOT constitute spillage?
Which of the following does NOT constitute spillage?
Signup and view all the answers
Which of the following is NOT an appropriate way to protect against inadvertent spillage?
Which of the following is NOT an appropriate way to protect against inadvertent spillage?
Signup and view all the answers
What should you NOT do if you find classified information on the internet?
What should you NOT do if you find classified information on the internet?
Signup and view all the answers
Who designates whether information is classified and its classification level?
Who designates whether information is classified and its classification level?
Signup and view all the answers
Which of the following is a good practice to protect classified information?
Which of the following is a good practice to protect classified information?
Signup and view all the answers
How many insider threat indicators does Alex demonstrate?
How many insider threat indicators does Alex demonstrate?
Signup and view all the answers
What should Alex's colleagues do?
What should Alex's colleagues do?
Signup and view all the answers
Which of the following is true?
Which of the following is true?
Signup and view all the answers
Which of the following best describes the conditions under which mobile devices and applications can track your location?
Which of the following best describes the conditions under which mobile devices and applications can track your location?
Signup and view all the answers
When is it okay to charge a personal mobile device using government-furnished equipment (GFE)?
When is it okay to charge a personal mobile device using government-furnished equipment (GFE)?
Signup and view all the answers
What security risk does a public Wi-Fi connection pose?
What security risk does a public Wi-Fi connection pose?
Signup and view all the answers
Which of the following represents an ethical use of your Government-furnished equipment (GFE)?
Which of the following represents an ethical use of your Government-furnished equipment (GFE)?
Signup and view all the answers
When may you be subject to criminal, disciplinary, and/or administrative action due to online harassment, bullying, stalking, hazing, discrimination, or retaliation?
When may you be subject to criminal, disciplinary, and/or administrative action due to online harassment, bullying, stalking, hazing, discrimination, or retaliation?
Signup and view all the answers
How can you protect yourself on social networking sites?
How can you protect yourself on social networking sites?
Signup and view all the answers
Which piece of information is safest to include on your social media profile?
Which piece of information is safest to include on your social media profile?
Signup and view all the answers
Which of the following is true of removable media and portable electronic devices (PEDs)?
Which of the following is true of removable media and portable electronic devices (PEDs)?
Signup and view all the answers
What is a security best practice for protecting Personally Identifiable Information (PII)?
What is a security best practice for protecting Personally Identifiable Information (PII)?
Signup and view all the answers
What is true of Controlled Unclassified Information (CUI)?
What is true of Controlled Unclassified Information (CUI)?
Signup and view all the answers
Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only?
Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only?
Signup and view all the answers
What is true of the Common Access Card (CAC) or Personal Identity Verification (PIV) card?
What is true of the Common Access Card (CAC) or Personal Identity Verification (PIV) card?
Signup and view all the answers
Which of the following is an example of a strong password?
Which of the following is an example of a strong password?
Signup and view all the answers
A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI ________.
A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI ________.
Signup and view all the answers
What is a good practice to protect classified information?
What is a good practice to protect classified information?
Signup and view all the answers
Based on the description that follows, how many potential insider threat indicators(s) are displayed? A colleague saves money for an overseas vacation every year, is a single father, and occasionally consumes alcohol.
Based on the description that follows, how many potential insider threat indicators(s) are displayed? A colleague saves money for an overseas vacation every year, is a single father, and occasionally consumes alcohol.
Signup and view all the answers
Which of the following statements is true?
Which of the following statements is true?
Signup and view all the answers
Which of the following is true about URLs?
Which of the following is true about URLs?
Signup and view all the answers
Study Notes
Organizational Data and Vendors
- Refer vendors conducting pilot programs for prototypes to the appropriate personnel for data requests.
Classified Data Protection
- Store classified data in a GSA-approved vault or container when not in use to ensure its security.
- Handling and storage of classified data is governed by specific classification markings and handling caveats.
Classified Equipment Usage
- Disable cameras, microphones, and Wi-Fi on unclassified laptops before using them in classified environments to prevent security breaches.
National Security Impact
- Disclosure of Top Secret information can cause exceptionally grave damage to national security.
Teleworking Protocols
- Obtain organizational permission before engaging in telework to ensure compliance with policies.
Marking Classified Material
- Properly mark all classified materials to maintain security and compliance with regulations.
Insider Threat Indicators
- Accessing sensitive information without proper need-to-know is a reportable insider threat activity.
- Observing unusual interest in classified information or personal difficulties may indicate potential insider threats.
Social Media and Personal Information
- Safest information to include on social media profiles is non-identifiable content, such as favorite movies.
- Apps and devices collect personal information, impacting online identity.
Controlled Unclassified Information (CUI) Management
- Store Controlled Unclassified Information in locked drawers after hours to protect sensitive data.
- Transmit CUI securely by verifying its classification and properly marking communications.
Physical Security Practices
- Good physical security is demonstrated by actively stopping unbadged individuals in secure areas.
Authentication Methods
- Utilizing two-factor authentication can enhance security, such as requiring a Common Access Card and Personal Identification Number.
Sensitive Compartmented Information (SCI) Protocol
- Access to SCI requires Top Secret clearance and indoctrination; confirm need-to-know before entry.
Removable Media Safety
- Removable media should be used cautiously within Sensitive Compartmented Information Facilities; non-compliance can lead to serious security incidents.
Identity Protection
- Protect personal identity by shredding sensitive documents and verifying identities before sharing information.
E-mail Security
- Digitally signed emails are considered more secure, ensuring communication integrity.
Public Wi-Fi Security
- Using public Wi-Fi poses risks; only connect through a Government VPN to secure sensitive information on personal devices.
Government-Furnished Equipment (GFE) Usage
- It is not permissible to charge personal mobile devices using GFE; this maintains equipment integrity.
Document Handling
- Promptly retrieve classified documents from printers to minimize unauthorized access.
Proper Mobile Device Protection
- Encrypt sensitive data on mobile devices to ensure compliance with security standards.
Spillage Protocol
- Spillage does not include classified information that is downgraded correctly; preventing inadvertent spillage involves adhering to transfer procedures.
Ethical Online Behavior
- Participants in discussions involving sensitive content should assess security clearances to avoid unauthorized dealings.
Online Security and Reputation
- Adversaries may exploit social media for malicious purposes, emphasizing the importance of maintaining a secure digital presence.
Effective URL Use
- URLs can be manipulated to disguise harmful intentions, necessitating caution when clicking on links.
Insider Threat Awareness
- Recognizing and reporting suspicious behaviors within organizations is crucial for maintaining security integrity.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
This quiz covers essential guidelines for handling classified data, including storage, equipment usage, and teleworking protocols. Understand the importance of compliance with security measures to protect national security and prevent insider threats.