Show Recommended textbook solutionsHuman Resource Management15th EditionJohn David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine 249 solutions
Anderson's Business Law and the Legal Environment, Comprehensive Volume23rd EditionDavid Twomey, Marianne Jennings, Stephanie Greene 369 solutions Information Technology Project Management: Providing Measurable Organizational Value5th EditionJack T. Marchewka 346 solutions Service Management: Operations, Strategy, and Information Technology7th EditionJames Fitzsimmons, Mona Fitzsimmons 103 solutions Recommended textbook solutionsSocial Psychology10th EditionElliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson 525 solutions Human Resource Management15th EditionJohn David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine 249 solutions
Operations Management: Sustainability and Supply Chain Management12th EditionBarry Render, Chuck Munson, Jay Heizer 1,698 solutions
Applied Calculus for the Managerial, Life, and Social Sciences8th EditionSoo Tan 6,275 solutions
Home Subjects Expert solutions Create Log in Sign up Upgrade to remove ads Only SGD 41.99/year
DOD-US1364-21. Option 2: Complete the Knowledge Check Option. Terms in this set (86)*Spillage Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity *Spillage Label all files, removable media, and subject headers with appropriate classification markings. *Spillage Spillage because classified data was moved to a lower classification level system without authorization. *Spillage Call your security point of contact immediately *Spillage Ask for information about the website, including the URL. *Spillage Refer the reporter to your organization's public affairs office. *Spillage Immediately notify your security point of contact *Spillage Be aware of classification markings and all handling caveats. *Spillage Note any identifying information and the website's Uniform Resource Locator (URL) **Classified Data Store classified data appropriately in a GSA-approved vault/container. **Classified Data Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know **Classified Data Secret **Classified Data Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material **Classified Data Classified material must be appropriately marked. **Classified Data Damage to national security **Classified Data You must have permission from your organization. **Classified Data Secret **Classified Data Store it in a General Services Administration (GSA)-approved vault or container **Insider Threat ~0 indicator
**Insider Threat 3 or more indicators **Insider Threat 1 indicator **Insider Threat Insiders are given a level of trust and have authorized access to Government information systems **Insider Threat Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. **Insider Threat A coworker removes sensitive information without authorization **Insider Threat A coworker uses a personal electronic device in a secure area where their use is prohibited. **Insider Threat 3 or more indicators **Insider Threat Hostility or anger toward the United States and its policies **Insider Threat Treated mental health issues **Social Networking After you have returned home following the vacation **Social Networking Decline the request **Social Networking Pictures of your pet **Social Networking Geotagging posts using Global Positioning System (GPS) or location links **Social Networking If the online misconduct also occurs offline **Social Networking Use only your personal contact information when establishing your account **Social Networking Your mother's maiden name **Social Networking Research the source of the article to evaluate its credibility and reliability **Social
Networking Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you. **Social Networking Inform your security point of contact *Controlled Unclassified Information Press release data *Controlled Unclassified Information CUI may be stored on any password-protected system. **Physical Security Challenge people without proper badges. **Physical Security CPCON 1 **Physical Security Ask the individual for identification **Identity Management On a NIPRNet system while using it for a PKI-required task **Identity Management Something you possess, like a CAC, and something you know, like a PIN or password **Identity management Use a common password for all your system and application logons. **Identity management Maintain possession of it at all times. **Identity management Store your Common Access Card (CAC) or
Personal Identity Verification (PIV) card in a shielded sleeve **Identity management Your password and a code you receive via text message **Identity management eA1xy2!P *Sensitive Compartmented Information A program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control *Sensitive Compartmented Information A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. *Sensitive Compartmented Information ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. *Sensitive Compartmented Information Security Classification Guide (SCG) *Sensitive Compartmented Information Directives issued by the Director of National Intelligence *Sensitive Compartmented Information At all times when in the facility *Sensitive Compartmented Information Retrieve classified documents promptly from printers *Sensitive Compartmented Information Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed *Sensitive Compartmented Information Mark SCI documents appropriately and use an approved SCI fax machine **Removable Media in a
SCIF It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. **Removable Media in a SCIF Government-owned PEDs when expressly authorized by your agency **Removable Media in a SCIF Identify and disclose it with local Configuration/Change Management Control and Property Management authorities *Malicious Code Viruses, Trojan horses, or worms *Malicious Code Legitimate software updates *Malicious Code No, you should only allow mobile code to run from your organization or your organization's trusted sites. **Website Use Since the URL does not start with "https," do not provide you credit card information. **Website Use Report the crime to local law enforcement **Website Use You should only accept cookies from reputable, trusted websites. **Social
Engineering Do not access website links, buttons, or graphics in e-mail **Social Engineering Phishing can be an email with a hyperlink as bait. **Social
Engineering Follow instructions given only by verified personnel. **Social Engineering A type of phishing targeted at senior officials **Social Engineering Investigate the link's actual destination using the preview feature **Social Engineering Use online sites to confirm or expose potential hoaxes **Social Engineering They may be used to mask malicious intent. **Travel Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. **Travel It may be compromised as soon as you exit the plane. **Travel It may expose the connected device to malware. **Use of GFE If allowed by organizational policy **Use of GFE Determine if the software or service is authorized **Mobile Devices Do not use any personally owned/non-organizational removable media on your organization's systems. **Mobile Devices Secure it to the same level as Government-issued systems **Mobile Devices Maintain visual or physical control of the device **Home Computer Security Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. **Home Computer Security Reviewing and configuring the available security features, including encryption **Home Computer Security Create separate accounts for each user Students also viewedDepartment of Defense (DoD) Cyber Awareness Challe…30 terms desilugirl1984 Cyber Awareness 2022 Knowledge Check45 terms VauronPLUS Cyber Awareness Challenge 2022 Knowledge Check30 terms obnoxiousguru Cyber Awareness Challenge 202292 terms bsitarz829 Other sets by this creatorLevel I Antiterrorism Awareness Training37 terms meme5986PLUS Chapter 47 terms meme5986PLUS ATP other6 terms meme5986PLUS Naming quiz Chem1 Dr. Lam37 terms meme5986PLUS When can you check personal email on your Government furnished equipment?When can you check personal e-mail on your Government-furnished equipment (GFE)? -If allowed by organizational policy. What can help to protect data on your personal mobile device? -Secure it to the same level as Government-issued systems.
When can you use removable media on a Government system?The emergency use of removable media will be permitted only on Defense Department computers that are in full compliance and possess the necessary hardware required to transfer the data safely. These requirements include using approved procedures and hardware to prevent unauthorized use.
Which email attachments are generally safe to open quizlet?Which email attachments are generally SAFE to open? Attachments contained in a digitally signed email from someone known. You receive a call from someone from the help desk who needs your assistance with a problem on your computer.
How can you protect your information when using wireless technology?Public Wireless Security
Use a virtual private network (VPN) if possible. Avoid using passwords and providing personal information to web sites. Encrypt your files. Be aware of your surroundings.
|