Podcast
Questions and Answers
What type of information does this personnel roster represent?
What type of information does this personnel roster represent?
Controlled unclassified information
When emailing this personnel roster, which of the following should you do? (Select all that apply)
When emailing this personnel roster, which of the following should you do? (Select all that apply)
- Send without encryption
- Use your government email account (correct)
- Encrypt the PII (correct)
- Digitally sign the email (correct)
What does it mean if your meeting notes are unclassified?
What does it mean if your meeting notes are unclassified?
They do not have the potential to damage national security
Which of the following poses a physical security risk?
Which of the following poses a physical security risk?
What must you do when using an unclassified laptop in a collateral classified environment? (Select all that apply)
What must you do when using an unclassified laptop in a collateral classified environment? (Select all that apply)
What must you do when working in a SCIF? (Select all that apply)
What must you do when working in a SCIF? (Select all that apply)
Is this an appropriate use of government-furnished equipment?
Is this an appropriate use of government-furnished equipment?
This is not an appropriate use of GFE. Why?
This is not an appropriate use of GFE. Why?
How can malicious code spread? (Select all that apply)
How can malicious code spread? (Select all that apply)
How can you prevent the download of malicious code? (Select all that apply)
How can you prevent the download of malicious code? (Select all that apply)
Which payment method poses the least risk?
Which payment method poses the least risk?
Which method of getting online poses the least risk?
Which method of getting online poses the least risk?
Which action will keep DoD data the safest?
Which action will keep DoD data the safest?
What step should be taken next to securely telework?
What step should be taken next to securely telework?
Which of these personally owned computer peripherals may be used with government-furnished equipment? (Select all that apply)
Which of these personally owned computer peripherals may be used with government-furnished equipment? (Select all that apply)
Does this action pose a potential security risk?
Does this action pose a potential security risk?
Select an action to take in response to compartmented information.
Select an action to take in response to compartmented information.
DR. Dove printed a classified document and retrieved it promptly from the printer. Does this behavior represent a security concern?
DR. Dove printed a classified document and retrieved it promptly from the printer. Does this behavior represent a security concern?
COL. Cockatiel worked on an unmarked document on the classified network. Does this behavior represent a security concern?
COL. Cockatiel worked on an unmarked document on the classified network. Does this behavior represent a security concern?
MR. Macaw and a colleague had a conversation about a shared project in the SCIF after verifying no one was nearby. Does this behavior represent a security concern?
MR. Macaw and a colleague had a conversation about a shared project in the SCIF after verifying no one was nearby. Does this behavior represent a security concern?
Which of these individuals demonstrated behavior that could lead to the compromise of SCI?
Which of these individuals demonstrated behavior that could lead to the compromise of SCI?
You find an unlabeled thumb drive in the parking area outside your workplace. What should you do?
You find an unlabeled thumb drive in the parking area outside your workplace. What should you do?
True or false? Voice-activated smart devices can collect and share your personal information.
True or false? Voice-activated smart devices can collect and share your personal information.
True or false? The best way to keep your passport safe is to carry it with you.
True or false? The best way to keep your passport safe is to carry it with you.
True or false? You should monitor your credit card statements for unauthorized purchases.
True or false? You should monitor your credit card statements for unauthorized purchases.
Does Bob demonstrate potential insider threat indicators?
Does Bob demonstrate potential insider threat indicators?
How should Bob's colleagues respond?
How should Bob's colleagues respond?
Flashcards
Controlled Unclassified Information (CUI)
Controlled Unclassified Information (CUI)
Information that is not classified but is still considered sensitive and requires protection.
Personnel Roster
Personnel Roster
A list of people who work at a specific organization.
Email Security
Email Security
Email security measures ensure that only authorized individuals can access the information and protect it from unauthorized access.
Personally Identifiable Information (PII)
Personally Identifiable Information (PII)
Signup and view all the flashcards
Unclassified Meeting Notes
Unclassified Meeting Notes
Signup and view all the flashcards
Physical Security Risk
Physical Security Risk
Signup and view all the flashcards
Sensitive Compartmented Information Facility (SCIF)
Sensitive Compartmented Information Facility (SCIF)
Signup and view all the flashcards
Need-to-Know
Need-to-Know
Signup and view all the flashcards
Inappropriate Use of Government Equipment
Inappropriate Use of Government Equipment
Signup and view all the flashcards
Email Usage Policies
Email Usage Policies
Signup and view all the flashcards
Malicious Code
Malicious Code
Signup and view all the flashcards
Prevention of Malicious Code
Prevention of Malicious Code
Signup and view all the flashcards
Secure Payment Methods
Secure Payment Methods
Signup and view all the flashcards
Secure Internet Access
Secure Internet Access
Signup and view all the flashcards
Data Security Best Practices
Data Security Best Practices
Signup and view all the flashcards
Telework
Telework
Signup and view all the flashcards
Personal Peripherals with GFE
Personal Peripherals with GFE
Signup and view all the flashcards
Potential Security Risks
Potential Security Risks
Signup and view all the flashcards
Compartmented Information
Compartmented Information
Signup and view all the flashcards
Security Point of Contact (POC)
Security Point of Contact (POC)
Signup and view all the flashcards
Document Handling
Document Handling
Signup and view all the flashcards
Classified Network
Classified Network
Signup and view all the flashcards
Conversations in a SCIF
Conversations in a SCIF
Signup and view all the flashcards
Behavior Leading to Security Compromise
Behavior Leading to Security Compromise
Signup and view all the flashcards
USB Drive
USB Drive
Signup and view all the flashcards
Voice-Activated Smart Devices
Voice-Activated Smart Devices
Signup and view all the flashcards
Passport
Passport
Signup and view all the flashcards
Monitoring Credit Card Activity
Monitoring Credit Card Activity
Signup and view all the flashcards
Insider Threat Indicators
Insider Threat Indicators
Signup and view all the flashcards
Study Notes
Controlled Unclassified Information
- A personnel roster is categorized as controlled unclassified information (CUI).
Email Security
- When emailing a personnel roster, ensure to encrypt personally identifiable information (PII), digitally sign the email, and use a government email account for security.
Unclassified Meeting Notes
- Unclassified meeting notes do not have the potential to harm national security.
Physical Security Risks
- Posting an access roster in public view poses a physical security risk.
Using Unclassified Laptops
- In a collateral classified environment, unclassified laptops require disabling the embedded camera, microphone, and Wi-Fi, and utilizing government-issued wired peripherals.
Working in SCIF
- In a Sensitive Compartmented Information Facility (SCIF), verify personnel have a need-to-know, ensure monitors have obstructed views, and escort uncleared personnel.
Appropriate Use of Government Equipment
- Using government-furnished equipment (GFE) for personal or unauthorized purposes is inappropriate.
Email Usage Policies
- Using government email for selling and unauthorized services, like file-sharing, breaches acceptable GFE conduct. Digital signatures are necessary for hyperlinks.
Spread of Malicious Code
- Malicious code can spread through email attachments, downloading files, and visiting infected websites.
Prevention of Malicious Code
- Safeguard against malicious code by scanning external files before uploading and researching apps for vulnerabilities before downloading.
Secure Payment Methods
- Cash transactions present the least risk when making payments.
Internet Access Risks
- Utilizing an approved mobile hotspot poses the least risk for online access.
Data Security Best Practices
- The safest action to protect DoD data is to leave a public space such as a coffee shop.
Secure Teleworking
- To securely telework, ensure the workspace is private so that others cannot see the monitor.
Personal Peripherals with GFE
- It is acceptable to use HDMI monitors and USB keyboards with government-furnished equipment.
Potential Security Risks
- Certain actions may pose potential security risks, necessitating caution.
Compartmented Information Response
- In response to sensitive compartmented information (SCI), contact your security point of contact (POC).
Security Concerns in Document Handling
- Printing and promptly retrieving a classified document does not typically represent a security issue.
Document Handling on Classified Network
- Working on unmarked documents in classified environments, like COL. Cockatiel's actions, raises security concerns.
Conversations in SCIF
- Discussing shared projects in a SCIF after verifying no one is nearby is not a security concern, as seen with MR. Macaw.
Behavior Leading to Security Compromise
- COL. Cockatiel’s behavior may risk compromising sensitive compartmented information (SCI).
Handling Found USB Drives
- Unlabeled thumb drives found in public areas should be turned in to a security officer for proper handling.
Voice-Activated Smart Devices
- Voice-activated smart devices can collect and share personal information, confirming the need for privacy awareness.
Passport Safety
- Carrying a passport is not the best method for keeping it safe; secure storage is recommended.
Monitoring Credit Card Activity
- Regularly monitoring credit card statements for unauthorized purchases is essential for financial security.
Insider Threat Indicators
- Bob exhibits potential insider threat indicators, requiring vigilance from colleagues.
Reporting Suspicious Behavior
- Bob’s colleagues should report any concerning behavior to maintain security protocols.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.