Scheduled maintenance: Saturday, September 10 from 11PM to 12AM PDT Show
Home Subjects Expert solutions Create Log in Sign up Upgrade to remove ads Only ₩37,125/year
Terms in this set (26)After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. You know this project is classified. What should be your response? Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. What is the best response if you find classified government data on the internet? Note any identifying information, such as the website's URL, and report the situation to your security POC. What is a good practice to protect classified information? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Which classification level is given to information that could reasonably be expected to cause serious damage to national security? Secret How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? 1 indicator Who might "insiders" be able to cause damage to their organizations more easily than others? Insiders are given a level of trust and have authorized access to Government information systems. What type of activity or behavior should be reported as a potential insider threat? Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. What information posted publicly on your personal social networking profile represents a security risk? Your place of birth When is the best time to post details of your vacation activities on your social networking website? When your vacation is over, and you have returned home What is the best example of Personally Identifiable Information (PII)? Date and place of birth What is the best example of Protected Health Information (PHI)? Your health insurance explanation of benefits (EOB) What does Personally Identifiable Information (PII) include? Social Security Number; date and place of birth; mother's maiden name What is a good practice for physical security? Challenge people without proper badges. Which is NOT sufficient to protect your identity? Use a common password for all your system and application logons. What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? Identification, encryption, and digital signature Which must be approved and signed by a cognizant Original Classification Authority (OCA)? Security Classification Guide (SCG) What describes how Sensitive Compartmented Information is marked? Approved Security Classification Guide (SCG) Which is a risk associated with removable media? Spillage of classified information. What is an indication that malicious code is running on your system? File corruption What is a valid response when identity theft occurs? Report the crime to local law enforcement. What is whaling? A type of phishing targeted at high-level personnel such as senior officials. What is a best practice while traveling with mobile computing devices? Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? If allowed by organizational policy Which of the following helps protect data on your personal mobile devices? Secure personal mobile devices to the same level as Government-issued systems. What is a best practice to protect data on your mobile computing device? Lock your device screen when not in use and require a password to reactivate. What is a possible indication of a malicious code attack in progress? A pop-up window that flashes and warns that your computer is infected with a virus. Sets with similar termsDOD Cyber Awareness Challenge 2019: Knowledge Chec…69 terms
ewizzy58 DOD Cyber Awareness Challenge 201924 terms Jamie_Lancaster BIS Test 371 terms PeytonJoe29 Drew Exam 450 terms vy_do58 Sets found in the same folderUSCG OPSEC Test out for Security Fundamentals17 terms chuck_wilson89 USCG Sexual Harassment prevention Test Out15 terms chuck_wilson89 Cyber Awareness 2020 Knowledge Check95 terms Lilwhiteshark97 Cyber Awareness 2020 Knowledge Check78 terms Luis_Marino Other sets by this creatorEducate Quiz8 terms haleyfj2000 Mod 7 Participation Quiz - pre test Chp 11 and 14,…15 terms haleyfj2000 Mod 6 Participation Quiz - pre test chp 9 and 10;…20 terms haleyfj2000 Mod 5 Participation Quiz - pre-test chp 8, 12-13,…21 terms haleyfj2000 Verified questions
SOCIOLOGY The enlightenment was an age of inquiry based on ? Not religion Verified answer
SOCIOLOGY Match terms a-e with the numbered example. a. cooperation b. conflict c. social exchange d. coercion e. conformity. Blood donors expect payment. Verified answer
SOCIOLOGY Complete the sentence using each term once. a. monogamy b. polyandry c. polygyny d. exogamy e. endogamy f. homogamy g. patrilineal h. blended family i. dual-employed marriage j. boomerang kids. The marriage of one man to one woman is called __________ Verified answer
SOCIOLOGY Which of the following is not one of the major categories of poor people in United States? a. children under age eighteen b. able-bodied men who refuse to work c. elderly people d. people with disabilities e. females who are single heads of households. Verified answer Other Quizlet setsENGLISH 12B NEW194 terms mtilton21 44. Workplace Safety Review20 terms Erin_Campbell614 Chapter 3 review Biology - Doyle30 terms Toby_Aranda Related questionsQUESTION A device used to steal credit card information by copying the data on the magnetic stripe is called a... 2 answers QUESTION BPA Marketing and Public Relations Award 12 answers QUESTION What is a Python wrapper for dex converters and Java decompilers? 2 answers QUESTION What is the name for an early Mesopotamian wedge-shaped writing using a stylus on clay? 5 answers What certificates does the Common Access Card CAC or PIV contain?Depending on the owner, the CAC contains one or three PKI certificates. If the CAC is used for identification purposes only, an ID certificate is all that is needed. However, in order to access a computer, sign a document, or encrypt email, signature and encryption certificates are also required.
What certificates are contained on the DoD Public Key Infrastructure implemented by the CAC PIV card?DOD PKI client certificates include 1 identity, 1 email signature, and 1 email encryption certificate, and may be obtained from the DoD free of charge.
How should you protect your Common Access Card CAC or Personal Identity Verification PIV card?To protect the information on your CAC, you should never tell anyone your PIN or write it down where it can be easily found. Your PIN should be kept secure at all times, just like your Social Security Number.
What can help protect the Data on your personal mobile device?How to Protect Your Mobile Phone Privacy [Calls, SMS & Location.... 6 Privacy Tips & Tools for Mobile Devices.. Stick to the App Store.. 1.2. Limit What Your Apps Can Access.. 1.3. Install A Security App.. 1.4. Secure Your Lock Screen.. 1.5. Set Up Find My Phone and Remote Wipe.. 1.6. ... . Keep Your Mobile Security & Privacy in Mind.. |