Podcast
Questions and Answers
How should you respond if your neighbor asks you to comment about a classified project?
How should you respond if your neighbor asks you to comment about a classified project?
Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity
Which of the following may help to prevent spillage?
Which of the following may help to prevent spillage?
- Ignore classification markings.
- Share unclassified information freely.
- Discuss classified information openly.
- Label all files with appropriate classification markings. (correct)
What is the best choice to describe unauthorized transfer of secret information to an unclassified system?
What is the best choice to describe unauthorized transfer of secret information to an unclassified system?
Spillage because classified data was moved to a lower classification level system without authorization.
What should you do when you receive an email with a classified attachment on an unclassified system?
What should you do when you receive an email with a classified attachment on an unclassified system?
What should you do if a reporter asks about potentially classified information on the web?
What should you do if a reporter asks about potentially classified information on the web?
What should you do if you suspect spillage has occurred?
What should you do if you suspect spillage has occurred?
Which of the following is a good practice to prevent spillage?
Which of the following is a good practice to prevent spillage?
What should you do after finding classified information on the Internet?
What should you do after finding classified information on the Internet?
You receive an inquiry from a reporter about government information not cleared for public release. How should you respond?
You receive an inquiry from a reporter about government information not cleared for public release. How should you respond?
How can you protect classified data when it is not in use?
How can you protect classified data when it is not in use?
What is required for an individual to access classified data?
What is required for an individual to access classified data?
Which classification level is given to information that could reasonably be expected to cause serious damage to national security?
Which classification level is given to information that could reasonably be expected to cause serious damage to national security?
Which of the following is a good practice to protect classified information?
Which of the following is a good practice to protect classified information?
What level of damage can the unauthorized disclosure of information classified as Confidential reasonably be expected to cause?
What level of damage can the unauthorized disclosure of information classified as Confidential reasonably be expected to cause?
Which of the following is true about telework concerning classified data?
Which of the following is true about telework concerning classified data?
Who designates whether information is classified and its classification level?
Who designates whether information is classified and its classification level?
Which of the following is true of Controlled Unclassified Information (CUI)?
Which of the following is true of Controlled Unclassified Information (CUI)?
Which of the following is NOT considered a potential insider threat indicator?
Which of the following is NOT considered a potential insider threat indicator?
What function do Insider Threat Programs aim to fulfill?
What function do Insider Threat Programs aim to fulfill?
Which scenario might indicate a reportable insider threat?
Which scenario might indicate a reportable insider threat?
What should you do if you receive a game application request that includes permissions to access personal information?
What should you do if you receive a game application request that includes permissions to access personal information?
Which is a security best practice when using social networking sites?
Which is a security best practice when using social networking sites?
When is the safest time to post details of vacation activities on your social networking profile?
When is the safest time to post details of vacation activities on your social networking profile?
At which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only?
At which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only?
Which Cyber Protection Condition (CPCON) is the priority focus on critical and essential functions only?
Which Cyber Protection Condition (CPCON) is the priority focus on critical and essential functions only?
Within a secure area, what should you do if you see an individual who is not wearing a visible badge?
Within a secure area, what should you do if you see an individual who is not wearing a visible badge?
Which of the following is a best practice for physical security?
Which of the following is a best practice for physical security?
Which of the following best describes good physical security? Select one.
Which of the following best describes good physical security? Select one.
In which situation are you permitted to use your PKI token?
In which situation are you permitted to use your PKI token?
What is the best description of two-factor authentication?
What is the best description of two-factor authentication?
Which is NOT a sufficient way to protect your identity?
Which is NOT a sufficient way to protect your identity?
What is the best way to protect your Common Access Card (CAC)?
What is the best way to protect your Common Access Card (CAC)?
Which of the following is NOT a best practice to preserve the authenticity of your identity?
Which of the following is NOT a best practice to preserve the authenticity of your identity?
Which of the following is an example of two-factor authentication?
Which of the following is an example of two-factor authentication?
Which of the following is true of using a DoD Public Key Infrastructure (PKI) token?
Which of the following is true of using a DoD Public Key Infrastructure (PKI) token?
Which of the following is true of the Common Access Card (CAC)?
Which of the following is true of the Common Access Card (CAC)?
Which of the following is an example of a strong password?
Which of the following is an example of a strong password?
Which of the following is an example of a strong password? Select one.
Which of the following is an example of a strong password? Select one.
Which of the following is an example of two-factor authentication? Select one.
Which of the following is an example of two-factor authentication? Select one.
What is Sensitive Compartmented Information (SCI)?
What is Sensitive Compartmented Information (SCI)?
Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)?
Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)?
A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI _____.
A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI _____.
When should documents be marked within a Sensitive Compartmented Information Facility (SCIF)?
When should documents be marked within a Sensitive Compartmented Information Facility (SCIF)?
Which must be approved and signed by a cognizant Original Classification Authority (OCA)?
Which must be approved and signed by a cognizant Original Classification Authority (OCA)?
What must the dissemination of information regarding intelligence sources, methods, or activities follow?
What must the dissemination of information regarding intelligence sources, methods, or activities follow?
When is it appropriate to have your security badge visible?
When is it appropriate to have your security badge visible?
What should the owner of printed SCI do differently?
What should the owner of printed SCI do differently?
What should participants in a conversation involving SCI do differently?
What should participants in a conversation involving SCI do differently?
When faxing Sensitive Compartmented Information (SCI), what actions should you take?
When faxing Sensitive Compartmented Information (SCI), what actions should you take?
What action should you take if you become aware that Sensitive Compartmented Information (SCI) has been compromised?
What action should you take if you become aware that Sensitive Compartmented Information (SCI) has been compromised?
Which of the following is true of transmitting Sensitive Compartmented Information (SCI)? Select one.
Which of the following is true of transmitting Sensitive Compartmented Information (SCI)? Select one.
Which of the following is true of Sensitive Compartmented Information (SCI)? Select one.
Which of the following is true of Sensitive Compartmented Information (SCI)? Select one.
Which of the following is true of sharing information in a Sensitive Compartmented Information Facility (SCIF)? Select one.
Which of the following is true of sharing information in a Sensitive Compartmented Information Facility (SCIF)? Select one.
What must users ensure when using removable media such as compact disks (CD)?
What must users ensure when using removable media such as compact disks (CD)?
What portable electronic devices (PEDs) are allowed in a Sensitive Compartmented Information Facility (SCIF)?
What portable electronic devices (PEDs) are allowed in a Sensitive Compartmented Information Facility (SCIF)?
What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)?
What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)?
Which of the following is NOT a potential consequence of using removable media unsafely in a Sensitive Compartmented Information Facility (SCIF)? Select one.
Which of the following is NOT a potential consequence of using removable media unsafely in a Sensitive Compartmented Information Facility (SCIF)? Select one.
Flashcards are hidden until you start studying
Study Notes
Spillage
- Spillage occurs when classified data is unintentionally transferred or disclosed to a lower classification system without authorization.
- Change the subject if asked about classified projects; neither confirm nor deny the information's authenticity.
- To prevent spillage, label files and removable media with appropriate classification markings.
- If you receive a classified attachment on an unclassified system, contact your security point of contact immediately.
- Report any suspected spillage to your security point of contact right away.
- Practices to prevent spillage include being aware of classification markings and handling caveats.
Classified Data
- Classified data must be stored in GSA-approved vaults or containers when not in use.
- Accessing classified information requires appropriate clearance, a signed non-disclosure agreement, and a need-to-know basis.
- The classification level "Secret" indicates information could cause serious damage to national security if disclosed.
- Classified materials must be properly labeled and marked for protection.
- Unauthorized disclosure of "Confidential" information could cause damage to national security, while "Top Secret" may cause exceptionally grave damage.
Insider Threat
- Insider threats leverage their trust and authorized access to sensitive information for malicious purposes.
- Potential indicators of insider threats include unusual interest in classified information, hostility towards U.S. policies, or obtaining classified information unauthorizedly.
- Behaviors such as persistent questioning about classified projects and removed sensitive information without permission are red flags.
- Insider Threat Programs aim to identify potential threats and develop comprehensive responses.
Social Networking
- Post vacation details only after returning home to avoid unwanted attention.
- Be cautious about granting permissions to game applications that access personal information.
- Security risks include exposing personal details like your birthday or mother's maiden name publicly.
- Best practices involve understanding privacy settings and validating friend requests.
Controlled Unclassified Information (CUI)
- CUI must be handled with safeguarding and dissemination controls to protect sensitive information.
- CUI is not considered classified, and storing it requires adhering to organizational protocols.
- Unauthorized storage of CUI on unapproved systems is against best practices.
- Protect Personally Identifiable Information (PII) by using government-approved equipment.
Physical Security
- Physically challenge individuals without appropriate badges within secure areas to maintain security integrity.
- Report suspicious activities to ensure rapid response to potential threats.
- Understand Cyberspace Protection Conditions (CPCON), which prioritize critical functions during heightened alert levels.
Identity Management
- Use two-factor authentication, which combines possession (e.g., a CAC) and knowledge (e.g., PIN) for robust security.
- Avoid common passwords across various accounts to diminish the risk of identity theft.### Identity Management
- Common Access Card (CAC) should be maintained at all times for protection.
- Writing down passwords on easily accessible devices, like smartphones, is not a best practice for maintaining identity authenticity.
- Two-factor authentication includes combining a password with a received code, enhancing security measures.
- DoD Public Key Infrastructure (PKI) tokens should only be used within systems for specific PKI-required tasks.
- The CAC includes certificates for identification, encryption, and digital signature, playing a crucial role in identity management.
- A strong password example is eA1xy2!P, showcasing complexity and security.
- Among various password examples, %2ZN=Ugq is the strongest due to its mix of characters and symbols.
- A valid example of two-factor authentication is a Common Access Card (CAC) and Personal Identification Number (PIN), providing an added layer of security.
Sensitive Compartmented Information (SCI)
- Sensitive Compartmented Information (SCI) segregates classified information into compartments for better protection and distribution control.
- A compromise occurs when unauthorized individuals gain access to SCI in any manner, breaching security protocols.
- All documents in a Sensitive Compartmented Information Facility (SCIF) must be appropriately marked, except for unclassified documents.
- Security Classification Guides (SCG) must be approved and signed by a recognized Original Classification Authority (OCA).
- The dissemination of intelligence sources and methods must adhere to directives from the Director of National Intelligence.
- Security badges must be visible at all times within SCIF facilities for identification purposes.
- Printed classified documents should be retrieved promptly to prevent unauthorized access.
- When discussing SCI, ensure all participants are cleared and have a need-to-know.
- Faxing SCI requires proper marking and the use of an approved SCI fax machine to maintain security integrity.
- If SCI is compromised, take actions such as evaluating the breach causes and reporting to security contacts.
Removable Media in a SCIF
- Users of removable media like CDs must ensure they are labeled with maximum classification, creation date, point of contact, and Change Management Control Number.
- Only government-owned Portable Electronic Devices (PEDs) expressly authorized by an agency are permitted in SCIFs.
- When using removable media inside SCIFs, it must be identified and disclosed to local authorities for Configuration/Change Management Control.
- Potential consequences of unsafe usage of removable media in SCIFs include loss of mission, loss of life, and compromise of sensitive information, while damage to the media itself is not a serious consequence.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.