Podcast
Questions and Answers
Mabel is a government employee who needs to share a document containing contractor proprietary information with his supervisor. What is the most appropriate way for Mabel to do this?
Mabel is a government employee who needs to share a document containing contractor proprietary information with his supervisor. What is the most appropriate way for Mabel to do this?
- Print it and hand it to her
- Email the document
- Share it on social media
- Use an approved secure sharing method (correct)
What is an authoritative source for a derivative classification?
What is an authoritative source for a derivative classification?
Security classification guide
What is an example of behavior that should be reported?
What is an example of behavior that should be reported?
Taking sensitive information home for telework without authorization
What might Terri have seen on her social media feed related to a smoke billowing from the Pentagon?
What might Terri have seen on her social media feed related to a smoke billowing from the Pentagon?
Which of the following is not an appropriate use for your Common Access Card?
Which of the following is not an appropriate use for your Common Access Card?
Spillage refers to the unauthorized disclosure of classified information.
Spillage refers to the unauthorized disclosure of classified information.
Which of the following is not a best practice for protecting data on a mobile device?
Which of the following is not a best practice for protecting data on a mobile device?
What is the best course of action if you receive a suspicious text message about a delayed package delivery?
What is the best course of action if you receive a suspicious text message about a delayed package delivery?
How can you protect your home computer?
How can you protect your home computer?
Printed Sensitive Compartmented Information (SCI) must be retrieved properly from the printer.
Printed Sensitive Compartmented Information (SCI) must be retrieved properly from the printer.
What is the best practice for physical security?
What is the best practice for physical security?
Which of the following is a step you should not take to protect against spillage?
Which of the following is a step you should not take to protect against spillage?
Unclassified DoD data may require access and distribution controls.
Unclassified DoD data may require access and distribution controls.
Which of the following is not a best practice for protecting your home wireless network?
Which of the following is not a best practice for protecting your home wireless network?
Where are you permitted to use classified data?
Where are you permitted to use classified data?
What action should Annabeth take if she believes a sensitive compartmented information conversation was overheard?
What action should Annabeth take if she believes a sensitive compartmented information conversation was overheard?
Which of these is not a potential indicator that your device may be under a malicious code attack?
Which of these is not a potential indicator that your device may be under a malicious code attack?
How should government-owned removable media be stored?
How should government-owned removable media be stored?
What is the best practice for using a government email?
What is the best practice for using a government email?
Which of the following uses of removable media is appropriate?
Which of the following uses of removable media is appropriate?
Which of the following is a risk associated with removable media?
Which of the following is a risk associated with removable media?
Protected Health Information (PHI) is a type of controlled unclassified information.
Protected Health Information (PHI) is a type of controlled unclassified information.
Which of the following contributes to your online identity?
Which of the following contributes to your online identity?
What is the best practice when browsing the Internet?
What is the best practice when browsing the Internet?
Flashcards
Secure Document Sharing
Secure Document Sharing
Sharing documents containing sensitive information with only those who have appropriate clearance ensures confidentiality.
Derivative Classification
Derivative Classification
Derivative classification refers to assigning security classifications to documents based on the information they contain, using the principles of original classification.
Reporting Sensitive Behavior
Reporting Sensitive Behavior
Unauthorized handling or transfer of sensitive information, such as taking it home, should be reported immediately to maintain security.
Social Media Caution
Social Media Caution
Signup and view all the flashcards
CAC Usage
CAC Usage
Signup and view all the flashcards
Mobile Device Security
Mobile Device Security
Signup and view all the flashcards
Suspicious Communications
Suspicious Communications
Signup and view all the flashcards
Home Computer Security
Home Computer Security
Signup and view all the flashcards
Handling Sensitive Information
Handling Sensitive Information
Signup and view all the flashcards
Physical Security Measures
Physical Security Measures
Signup and view all the flashcards
Preventing Data Spillage
Preventing Data Spillage
Signup and view all the flashcards
Unclassified Data Controls
Unclassified Data Controls
Signup and view all the flashcards
Home Wireless Network Security
Home Wireless Network Security
Signup and view all the flashcards
Use of Classified Data
Use of Classified Data
Signup and view all the flashcards
Security Breaches
Security Breaches
Signup and view all the flashcards
Indicators of Malicious Code
Indicators of Malicious Code
Signup and view all the flashcards
Insider Threat Indicators
Insider Threat Indicators
Signup and view all the flashcards
Storing Government Media
Storing Government Media
Signup and view all the flashcards
Best Practice for Government Emails
Best Practice for Government Emails
Signup and view all the flashcards
Appropriate Use of Removable Media
Appropriate Use of Removable Media
Signup and view all the flashcards
Risks of Removable Media
Risks of Removable Media
Signup and view all the flashcards
PHI Protection
PHI Protection
Signup and view all the flashcards
Online Identity Formation
Online Identity Formation
Signup and view all the flashcards
Internet Browsing Safety
Internet Browsing Safety
Signup and view all the flashcards
Study Notes
Document Sharing Procedures
- Government employees must securely share documents containing sensitive information with appropriate clearance only.
- Best practices involve approved methods as per security guidelines.
Derivative Classification
- Security classification guides serve as authoritative sources for derivative classification.
Reporting Sensitive Behavior
- Unauthorized handling or transfer of sensitive information, such as taking it home for telework, should be reported immediately.
Social Media Caution
- Posts featuring alarming content (e.g., smoke at the Pentagon) may be phishing attempts designed to steal personal information.
Common Access Card (CAC) Usage
- CAC is not appropriate for photo identification in commercial settings; it is exclusive to government purposes.
Data Protection Practices
- Automatic screen locking on mobile devices is essential for protecting sensitive data.
Suspicious Communications
- If you receive unexpected messages about package deliveries, especially with links, it is safest to delete the message to avoid phishing attempts.
Home Computer Security
- Enabling password protection on home computers is critical for security against unauthorized access.
Handling Sensitive Information
- Sensitive Compartmented Information (SCI) must be retrieved properly from printers to prevent unauthorized access.
Physical Security Protocols
- Best physical security practice includes using personal security badges or access codes to enter facilities.
Preventing Data Spillage
- Never purge device memory before connecting to a classified network; this can lead to data spillage and unauthorized access.
Unclassified Data Controls
- DoD unclassified data may still require specific access and distribution controls to maintain security.
Home Wireless Network Security
- Avoid using preset router service set identifiers (SSIDs) and passwords; create unique ones for enhanced security.
Use of Classified Data
- Classified data is permitted only in a Secure Compartmented Information Facility (SCIF).
Response to Potential Security Breaches
- If sensitive information is potentially overheard, contact a security Point of Contact (POC) immediately with details.
Indicators of Malicious Code
- Standard notifications for system updates are not indicators of a malicious code attack.
Insider Threat Indicators
- Prolonged good performance does not necessarily indicate insider threat but requires vigilance in monitoring unusual behaviors.
Storing Government Media
- Removable media should be stored in GSA-approved containers based on their security classification for protection.
Best Practice for Government Emails
- Mass emails should be avoided to protect sensitive information and maintain communication integrity.
Appropriate Use of Removable Media
- Encrypting data when using removable media is a best practice to prevent unauthorized access.
Risks of Removable Media
- Many risks are associated with removable media usage, including potential data breaches if not handled securely.
Protected Health Information (PHI)
- PHI is not classified as controlled unclassified information but is instead protected under health privacy laws.
Online Identity Formation
- Online identity is shaped by various factors, including social media use, browsing habits, and personal disclosures.
Internet Browsing Safety
- Accept cookies only from reputable and trusted websites to minimize security risks while browsing online.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.