endstream
endobj
1069 0 obj
<>/Metadata 18 0 R/Pages 1066 0 R/StructTreeRoot 22 0 R/Type/Catalog/ViewerPreferences 1083 0 R>>
endobj
1070 0 obj
<>/MediaBox[0 0 842.04 595.32]/Parent 1066 0 R/Resources<>/Font<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI]>>/Rotate 0/StructParents 0/Tabs/S/Type/Page>>
endobj
1071 0 obj
<>stream
Which of the following is NOT a DoD special requirement for tokens? Physical Security: (Incident #2): What should the employee do differently? Government furnished property can be designated as either equipment or material.
Which of the following demonstrates proper protection of mobile devices? A total of 200 units were produced in Job 413. Classified data: (Scene) Which of the following is true about telework? (Malicious Code) What are some examples of removable media? a. Security Classification Guides. Who designates whether information is classified and its classification level? Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI. It does not require markings or distribution controls. The Contractor shall use Standard Form 1428 for Inventory Disposal. What actions should you take prior to leaving the work environment and going to lunch? Edited/new version of DASA Short form contract uploaded to documents, Update to text from 'All competitions will use the new' to 'Many competitions, especially Phase 1 earlier TRL competitions, will use the new', Please note we have updated our short form contract template. When is it appropriate to have your security badge visible? (Answer) CPCON 2 (High: Critical and Essential Functions) CPCON 1 (Very High: Critical Functions) CPCON 3 (Medium: Critical, Essential, and Support Functions) CPCON 4 (Low: All Functions) CPCON 5 (Very Low: All Functions). This must include the overall price, but not a breakdown of the pricing structure if that detailed information can be redacted under the Freedom of Information Act. All https sites are legitimate. Which of the following should you do immediately? You may use your personal computer as long as it is in a secure area in your home b. Which of the following is not considered a potential insider threat indicator? On Jan. 30, 2023, President Joe Biden announced that the COVID-19 public health emergency (PHE) will end May 11, 2023. How can you protect yourself on social networking sites? economics. No to all: Viewing or downloading pornography, gambling online, conducting a private money-making venture, using unauthorized software, Illegally downloading copyrighted material, making unauthorized configuration changes. How can malicious code cause damage? ( On a computer displaying a notification to update the antivirus softwareB. GFAE: Government-Furnished Aeronautical Equipment. We wont pre-fund any expenditure, so interim payment claims mustnt include costs not yet incurred. Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only? Physical security of mobile phones carried overseas is not a major issue. Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. Exceptionally grave damage to national security. What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? Which of the following is NOT a social engineering tip? Proactively identify potential threats and formulate holistic mitigation responses. Only when badging in b. After you have returned home following the vacation. Her badge is not visible to you. CPCON 1. Which of the following statements is true? Which of the following actions can help to protect your identity? An experiment consists of tossing three fair (not weighted) coins, except that one of the three coins has a head on both sides. \text{Stockholders' Equity:}&&&\\ 1304). A vendor conducting a pilot program with your organization contacts you for organizational data to use in a prototype. He has the appropriate clearance and a signed, approved, non-disclosure agreement. Well send you a link to a feedback form. If classified information were released, which classification level would result in Exceptionally grave damage to national security? Be aware that it could take a period of time for the account to be activated. Removable Media in a SCIF (Evidence): What portable electronic devices (PEDs) are permitted in a SCIF? Use the classified network for all work, including unclassified work. **Social Engineering Which may be a security issue with compressed Uniform Resource Locators (URLs)? Which of the following does NOT constitute spillage? Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)? Maybe. Which of the following does NOT constitute spillage? Proprietary data b. Which of the following does NOT constitute spillage? **Physical Security At which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? Y"{+lr)v&e]8OMoUBgT+E G +$f}'@$c(QxE'{=Q[M{Qdf7N*1^1zyti#;@_r+~>(.D$!yn@L3pgA0#Dk(-]+utfoZaF0gyz=l%Ec\'"]e:7i/-L(*#Nw%r0I3Km@ P@Ya5 $ .nlPE*k8]xkh0D!_/~CyVIS Which is a way to protect against phishing attacks? Based on the description that follows, haw many potential insider threat indicator(s) are displayed? Use the classified network for all work, including unclassified work. **Insider Threat What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? 4161.02 Accountability and Management of Government Contract Property, Standard Form 1428 for Inventory Disposal, DFARS Subpart 245.3: Providing Government Property to a Contractor, DoD InstructionDoDI 4161.02 Accountability and Management of Government Contract Property, DFARS PGI 245.103-70 (1) Furnishing Government property to contractors, DoD Roles and Responsibilities of Program Managers for Government Property. Refer the reporter to your organizations public affairs office. Immediately notify your security point of contact. On a system of a higher classification level, such as the Secret Internet Protocol Router Network (SIPRNet), On a NIPRNet system while using it for a PKI-required task, What guidance is available for marking Sensitive Compartmented Information (SCI)?A. The following guidance will help you to understand what these terms and conditions mean. When can you check personal email on your government furnished equipment? A personally owned device approved under Bring Your Own Approved Device (BYOAD) policy must be unenrolled while out of the country. It will take only 2 minutes to fill in. **Mobile Devices Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? You must possess security clearance eligibility to telework. ! (A type of phishing targeted at senior officials) Which is still your FAT A$$ MOTHER! *Sensitive Compartmented Information When should documents be marked within a Sensitive Compartmented Information Facility (SCIF). (Sensitive Information) Which of the following is NOT an example of sensitive information? How many potential insiders threat indicators does this employee display? **Use of GFE Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? Which of the following is a security best practice for protecting Personally Identifiable Information (PII)? Software that installs itself without the user's knowledge. When using your government-issued laptop in public environments, with which of the following should you be concerned? You must provide details to us of any related public announcement for review prior to release. Which of the following is a best practice for using removable media? All open opportunities are listed on the Apply for Funding page. CPCON 5 (Very Low: All Functions). Which of the following is true of using DoD Public key Infrastructure (PKI) token? hVo0W*$E*TG-%V$
%d|#I 1!=#"b$!'1Xr$8vG}z|C/B Sensitive Compartmented Information GuidesB. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Which of the following is an example of malicious code? Which of the following is NOT a requirement for telework? You check your bank statement and see several debits you did not authorize. Sensitive information may be stored on any password-protected system. How can you protect yourself from social engineering? It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. Only friends should see all biographical data such as where Alex lives and works. Ensure there are no identifiable landmarks visible in any photos taken in a work setting that you post. GFE consists of: b. Which of the following represents a good physical security practice? For the specific purposes of considering additional funding for a competition and onward exploitation opportunities, DASA also reserves the right to share information in your proposal in-confidence with any UK Government Department. Conducting a private g*mbling online. What is the best response if you find classified government data on the internet? Illegally downloading copyrighted material - No Which of the following is a good practice to protect classified information? Correct. What type of security is part of your responsibility and placed above all else?, If your wireless device is improperly configured someone could gain control of the device? Which method would be the BEST way to send this information? Monitor credit card statements for unauthorized purchases, Thumb drives, memory sticks, and flash drives are examples of. Checking personal e-mail when allowed by your organization. DOD Cyber Awareness Challenge 2019 (DOD-IAA-V16.0) *Social Networking Cyber Awareness Challenge Complete Questions and Answers The email has an attachment whose name contains the word secret. Avoid talking about work outside of the workplace or with people without a need-to-know, Report the suspicious behavior in accordance with their organization's insider threat policy. What should the owner of this printed SCI do differently? Which of the following should be done to keep your home computer secure? Which of the following personally-owned computer peripherals is permitted for use with Government-furnished equipment? Home Computer Security (Evidence): Antivirus alert. You are misusing a Government vehicle when you use it for your personal benefit as opposed to using it for the benefit of the Government. The relevant people will be named in the subsequent contract. Unusual interest in classified information. CPCON 2 (High: Critical and Essential Functions) Note the websites URL and report the situation to your security point of contact. If aggregated, the information could become classified. (Malicious Code) What is a good practice to protect data on your home wireless systems? *Spillage What should you do if you suspect spillage has occurred? *Spillage A user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. DOD Cyber Awareness 2022 Knowledge Check Flashcards | Quizlet Accepting the default privacy settings. The last payment, entitled satisfactory completion of all work under the contract, shall be at least 20% of the total quoted firm price. Using webmail may bypass built in security features. Memory sticks, flash drives, or external hard drives. d. All of these. 10.8.27 Personal Use of Government Furnished Information Technology Which of the following is NOT a criterion used to grant an individual access to classified data? a. Government Furnished Equipment (GFE) ( FAR Part 45) is equipment that is owned by the government and delivered to or made available to a contractor. **Insider Threat Which type of behavior should you report as a potential insider threat? An investment in knowledge pays the best interest.. Access to and use of the information of this website is at the user's risk. When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag.
Hudson And Rex Actress Pregnant, Most Expensive Wedding Photographer In The World, Henry Big Boy Red Dot Mount, Estes Park Webcams Stanley Hotel, Articles P
Hudson And Rex Actress Pregnant, Most Expensive Wedding Photographer In The World, Henry Big Boy Red Dot Mount, Estes Park Webcams Stanley Hotel, Articles P