As part of the survey the caller asks for birth date and address. a. **Mobile Devices Which of the following helps protect data on your personal mobile devices? How can you protect your organization on social networking sites? Use of Government Furnished Equipment (GFE) During Foreign Travel. To help with this, prices in your proposal must be supported by a full cost breakdown. Which of the following is NOT a correct way to protect sensitive information? Gambling online - No What should you do? Where any deliverable is subject to third party intellectual property rights (IPR) you must also describe this in your proposal. Malicious code can mask itself as a harmless e-mail attachment, downloadable file, or website. Which of the following is NOT a home security best practice? Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. When is it okay to charge a personal mobile device using government-furnished equipment (GFE)? A system reminder to install security updates b. Which of the following is true of Protected Health Information (PHI)? Lionel stops an individual in his secure area who is not wearing a badge. Use your legitimate antivirus software to perform a virus scan instead. Which of the following is a good practice to protest classified information? Which of the following statements is true of cookies? How many insider threat indicators does Alex demonstrate? Which of the following individuals can access classified data? What action is recommended when somebody calls you to inquire about your work environment or specific account information? Research the source of the article to evaluate its credibility and reliability. Government Furnished Assets (GFA) could be equipment, information or resources that are government-owned and loaned (on a free-of-charge basis) to a contractor to . Department Guidance Use of Government Furnished Equipment (GFE) During Foreign Travel. What type of attack might this be? Cyber Awareness Challenge 2023 Answers Quizzma Best answer. Which of the following actions is appropriate after finding classified Government information on the internet? What function do Insider Threat Programs aim to fulfill? Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Select the information on the data sheet that is protected health information (PHI). Only connect via an Ethernet cable. He has the appropriate clearance and a signed, approved, non-disclosure agreement. What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)? You are having lunch at a local restaurant outside the installation, and you find a cd labeled favorite song. Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. (controlled unclassified information) Which of the following is NOT an example of CUI? Avoid talking about work outside of the workplace or with people without a need-to-know. What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? Avoid talking about work outside of the workplace or with people without need-to-know. Select all security issues. DoD Cyber Awareness 2019 - Subjecto.com It is releasable to the public without clearance. Which of the following is an example of a strong password? Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know, Insiders are given a level of trust and have authorized access to Government information systems. What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? On a system of a higher classification level, such as the Secret Internet Protocol Router Network (SIPRNet), On a NIPRNet system while using it for a PKI-required task, What guidance is available for marking Sensitive Compartmented Information (SCI)?A. Classified information that should be unclassified and is downgraded. Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. A type of phishing targeted at high-level personnel such as senior officials. correct. **Identity management What is the best way to protect your Common Access Card (CAC)? How many potential insider threat indicators does this employee display? Store it in a GSA approved vault or container. stream Damage b. *Insider Threat Which of the following is a potential insider threat indicator? Use a common password for all your system and application logons. Organizational Policy Not correct Where this is the case you should also state clearly in your proposal the details of the prior contract and the associated intellectual property contract conditions. Which of the following may help to prevent spillage? Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only? Which of the following is NOT sensitive information? Which of the following statements is true? Laptop (Take CAC out), PIN note (Never write your PIN. Government Furnished Equipment: GFE refers to tooling or equipment thats provided to a contractor for use during the project . Request the users full name and phone number. DASA will examine the legal status of organisations prior to placement of any contract. Which is a way to protect against phishing attacks? DASA recognises the value of your intellectual property (IP). endstream endobj 1073 0 obj <>stream An investment in knowledge pays the best interest.. If your organization allows it. What should the participants in this conversation involving SCI do differently? A Common Access Card and Personal Identification Number. used in telework environments in accordance with reference (b). What portable electronic devices (PEDs) are permitted in a SCIF? Classified material must be appropriately marked. lock On a computer at the public library to check your DOD email.D. Depending on the specifics of any proposed change of use, including any building work . Use a digital signature when sending attachments or hyperlinks. urpnUTGD. Linda encrypts all of the sensitive data on her government-issued mobile devices. How was one of the weaknesses of a free enterprise economy illustrated by the Great Depression? Use the classified network for all work, including unclassified work. The site is available via registered access. Report the suspicious behavior in accordance with their organizations insider threat policy. **Insider Threat What do insiders with authorized access to information or information systems pose? P2P (Peer-to-Peer) software can do the following except: Allow attackers physical access to network assets. Incident #2 We also use cookies set by other sites to help us deliver content from their services. DOD CYBER AWARENESS *UPDATED* Flashcards | Quizlet Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? For your proposal to be accepted for assessment, you must tick a box to confirm your organisations unqualified acceptance of DASA terms and conditions for the respective competition. What is considered ethical use of the Government email system? b. How Do I Answer The CISSP Exam Questions? You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. Insider threat: (Ellens statement) How many insider threat indicators does Alex demonstrate? Illegally downloading copyrighted material - No CPCON 2 (High: Critical and Essential Functions) c Which of the following is NOT Government computer misuse? Hold the conversation over e-mail or instant messenger to avoid being overheard. (Answer) CPCON 2 (High: Critical and Essential Functions) CPCON 1 (Very High: Critical Functions) CPCON 3 (Medium: Critical, Essential, and Support Functions) CPCON 4 (Low: All Functions) CPCON 5 (Very Low: All Functions). Press release data c. Financial information. Which of the following demonstrates proper protection of mobile devices? Press release data. NOT permitted uses of government-furnished equip (GFE) -viewing or downloading pornography -conducting a private gambling online -using unauthorized software -illegal downloading copyrighted materials -making unauthorized configuration changes When is it okay to charge a personal mobile device using government-furnished equipment (GFE) It is permissible to release unclassified information to the public prior to being cleared. What is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Further guidance included in "What DASA does not fund" section. Nothing. In competitions using the ISC and DEFCON 705 you must also state in your proposal if the deliverables are what we call Full Rights or Limited Rights versions. **Mobile Devices Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Which of the following is true of using DoD Public key Infrastructure (PKI) token? - correct Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? How can you protect yourself from social engineering? Only use Government-approved equipment to process PII. What is required for an individual to access classified data? Malicious Code (Prevalence): Which of the following is an example of malicious code? This bag contains your government-issued laptop. **Identity Management Which of the following is the nest description of two-factor authentication? Which designation includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? What information posted publicly on your personal social networking profile represents a security risk? Turn on automatic downloading b. (Sensitive Compartmented Information) Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)? You are misusing a Government vehicle when you use it for your personal benefit as opposed to using it for the benefit of the Government. What security device is used in email to verify the identity of sender? Any additions will be mutually agreed with you before a contract is awarded. What is a best practice for protecting controlled unclassified information (CUI)? Government-owned PEDs, if expressly authorized by your agency. Permitted Uses of Government-Furnished Equipment (GFE). If you participate in or condone it at any time. Which designation includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? When would be a good time to post your vacation location and dates on your social networking website? What is a security best practice to employ on your home computer? *Malicious Code After visiting a website on your Government device, a popup appears on your screen. Search for instructions on how to preview where the link actually leads. What should you do? What should Sara do when using publicly available Internet, such as hotel Wi-Fi? Here you can find answers to the DoD Cyber Awareness Challenge. Youll need to register and then activate your account before you can browse the toolkit. Submission Service reopen dates published. When leaving your work area, what is the first thing you should do? Which of the following demonstrates proper protection of mobile devices? (Spillage) After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. The determination of GFE is usually made by the government Program Manager (PM) and Contracting Officer. sensitive but unclassified. Correct. a. a. Do not download it. Which of the following is true of Security Classification Guides? DOD Cyber Awareness 2021 Knowledge Check. Heres how you know. Which of the following is true of Controlled Unclassified information (CUI)? Install now? CUI must be handled using safeguarding or dissemination controls. Individuals are prohibited from using government furnished equipment (e.g., copier, fax machine) to make more than a few copies of material (e.g., copying a book, making numerous copies of a resume, or sending/receiving a lengthy document via fax machines), as well as any use of such machines that conflicts with the actual need to use the government furnished equipment for official business . Exceptionally grave damage to national security. economics. You can decide how often to receive updates. Attempting to access sensitive information without need-to-know. c. Alan uses password protection as required on his government-issued smartphone but prefers the ease of no password on his personal smartphone. What should be done if you find classified Government Data/Information Not Cleared for Public Release on the Internet? English is the official language for all communication between bidders, DASA and in all parts of DASA proposals. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Which scenario might indicate a reportable insider threat? Retrieve classified documents promptly from printers. How many potential insider threat indicators does this employee display? Check in location via GPS: Off. Salisbury Top Secret information could be expected to cause exceptionally grave damage to national security of disclosed. **Social Networking What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sires visited? As part of your proposal you will be required to provide a proposal title and a short abstract that you permit us to publish and use freely. The following guidance will help you to understand what these terms and conditions mean. *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. .gov Remove your security badge after leaving your controlled area or office building. They can become an attack vector to other devices on your home network. When is it okay to charge a personal mobile device using government-furnished equipment (GFE)? No to all: Viewing or downloading pornography, gambling online, conducting a private money-making venture, using unauthorized software, Illegally downloading copyrighted material, making unauthorized configuration changes. What type of data must be handled and stored properly based on classification markings and handling caveats? c. Nothing. ) NOT permitted uses of government-furnished equip (GFE) for: Viewing or downloading p*rn*graphy. (Spillage) Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? Store classified data appropriately in a GSA-approved vault/container. In which situation below are you permitted to use your PKI token?A. If you are concerned your project falls in to one of these categories and are unsure if you should submit a full proposal for a competition please submit a Contact DASA Form which will be checked by a member of our team. Which of the following includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? HTMk0(XlB[[CxBIQv ,h{K{:2I!ILaTh}|?~54C&F. Which of the following is NOT considered sensitive information? Which of the following is true of Unclassified information? To: All Oregon/Washington Bureau of Land Management Employees. Which of the following must you do before using an unclassified laptop and peripherals in a collateral classified environment? A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. What should you do if someone asks to use your government issued mobile device (phone/laptop..etc)? What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web? The website requires a credit card for registration. What level of damage to national security can you reasonably expect Top secret information to cause if disclosed? No. You can propose an interim payment plan, which must be supported by a detailed expenditure profile showing projected monthly expenditure figures. You are working at your unclassified system and receive an email from a coworker containing a classified attachment. When teleworking, you should always use authorized and software. (Spillage) When is the safest time to post details of your vacation activities on your social networking website? (Malicious Code) What is a good practice to protect data on your home wireless systems? ALways mark classified information appropriately and retrieve classified documents promptly from the printer. *Spillage Which of the following may help prevent inadvertent spillage? What can be used to track Marias web browsing habits? Which of the following is a good practice to prevent spillage. What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)? Research the source to evaluate its credibility and reliability. (Spillage) What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? Decline So That You Maintain Physical Control of Your Government-Issued Laptop. IncreasDecreaseNormalBalanceBalancesheetaccounts:AssetDebitLiabilityDebitStockholdersEquity:CapitalStockCreditRetainedEarningsCreditDividendsCreditCreditIncomestatementaccounts:RevenueCreditExpense(l)CreditDebit\begin{array}{lcc} 3 0 obj **Identity management Which of the following is an example of two-factor authentication? What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? Which of the following is an example of malicious code? cyber-awareness email government organisation permission equipment 1 answer Under what circumstances is it acceptable to use your Government-furnished computer to check person e-mail asked in Internet by voice (263k points) internet internet-quiz cyber cyber-awareness government computer email personal policy 1 answer Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? Software that installs itself without the users knowledge c. A firewall that monitors and controls network traffic. Malicious code can do the following except? Only connect with the Government VPN. Purpose: This instruction memorandum (IM) provides . When using your government-issued laptop in public environments, with which of the following should you be concerned? Government Furnished Equipment (GFE) (FAR Part 45) is equipment that is owned by the government and delivered to or made available to a contractor. **Insider Threat What is an insider threat? **Removable Media in a SCIF What portable electronic devices (PEDs) are allowed in a Sensitive Compartmented Information Facility (SCIF)? correct. Which of the following is NOT a best practice to protect data on your mobile computing device? Following instructions from verified personnel. \hline Article - Billing and Coding: Category III Codes (A56902) Which of the following is true of the Common Access Card (CAC) or Personal Identity Verification (PIV) card? (Spillage) Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? Which is NOT a wireless security practice? Ask the individual to see an identification badge. After clicking on a link on a website, a box pops up and asks if you want to run an application. Dont include personal or financial information like your National Insurance number or credit card details. https://intranet.hhs.gov/about-hhs/national-security/policy/gfe-foreign-travel-2018. Dofficult life circumstances, such as death of spouse. Select Yes or No for each item. Each Form 388 must be signed and returned with a brief curriculum vitae (CV) of each person by the nominated individual completing the work. Use personal information to help create strong passwords. Proprietary data b. Which is a best practice for protecting Controlled Unclassified Information (CUI)? Ctrl+F (Cmd+F) will help you a lot when searching through such a large set of questions. Tell us about it through the REPORT button at the bottom of the page. Be aware of classification markings and all handling caveats. Adversaries exploit social networking sites to disseminate fake news Correct. (Sensitive Information) What guidance is available from marking Sensitive Information information (SCI)? The general policy is to have the contractor furnish the equipment needed. Sensitive information may be stored on any password-protected system. Avoid talking about work outside of the workplace or with people without a need-to-know, Report the suspicious behavior in accordance with their organization's insider threat policy. We use technology readiness levels (TRL) to give an indication of an innovation. Which of the following is a good practice to prevent spillage? **Insider Threat Which of the following is NOT considered a potential insider threat indicator? Secure it to the same level as Government-issued systems. (Spillage) Which of the following is a good practice to aid in preventing spillage? - Updated ISC Schedule, Innovation Standard Contract Limit of Liability change - new version attached. Leaked classified or controlled information is still classified/controlled even if it has already been compromised. Porton Down ;A- fKpe'xfX@na=lzt Qh|(j@SYG}~1BY/6:{HqMvD` KNZ/)t\+b*"gO1s Insiders are given a level of trust and have authorized access to Government information systems. Transmit classified information via fax machine only Not correct Which of the following does not constitute spillage. If youre requesting interim payments you must comply with the following: Government Furnished Assets (GFA) could be equipment, information or resources that are government-owned and loaned (on a free-of-charge basis) to a contractor to assist in the completion of the contract. Unless stated otherwise below or in the relevant competition document, all information you provide to us as part of your proposal, that is not already available to us from other sources, will be handled in confidence. **Social Engineering Which may be a security issue with compressed Uniform Resource Locators (URLs)? %%EOF **Travel Which of the following is true of traveling overseas with a mobile phone? Which of the following is an example of removable media? HTMO@[)4T@c4RIhj{v **Physical Security At which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? Which of the following is a reportable insider threat activity? Only expressly authorized government-owned PEDs. You must provide details to us of any related public announcement for review prior to release. Which of the following is NOT a potential insider threat? NON-MEDICAL NECESSITY COVERAGE AND PAYMENT RULES. What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. Find out about the Energy Bills Support Scheme, Armed forces and Ministry of Defence reform, Defence and Security Accelerator (DASA) Open Call for Innovation, Defence and Security Accelerator: ethical, legal and regulatory guidance, Technology concept and/or application formulated, Analytical and experimental critical function and/or characteristic proof of concept, Technology basic validation in a laboratory environment, Technology basic validation in a relevant environment, Technology model or prototype demonstration in a relevant environment, Technology prototype demonstration in an operational environment, Actual technology completed and qualified through test and demonstration, Actual technology qualified through successful mission operations, projects or manpower that is currently receiving funding or has already been funded from elsewhere in government, concepts which are not novel or innovative. Which of the following is NOT a typical result from running malicious code? How many potential insiders threat indicators does this employee display? How can you protect yourself on social networking sites? CPCON 5 (Very Low: All Functions). Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. DOD Cyber Awareness Challenge 2019- Knowledge Check Do not access links or hyperlinked media such as buttons and graphics in email messages. a. Label all files, removable media, and subject headers. *Controlled Unclassified Information Which of the following is NOT an example of CUI? d. All of these. Which of the following is a good practice to avoid email viruses? a. Which of the following is NOT a correct way to protect CUI? Please note that this process will take as long as necessary and could take up to 6 weeks in some cases for non-UK nationals. Not correct Label all files, removable media, and subject headers with appropriate classification markings.
Coaching For Healing, Justice And Liberation, Ibew Local 25 Apprenticeship Pay Scale, Articles P
permitted uses of government furnished equipment 2023