What action should you take? You check your bank statement and see several debits you did not authorize. Label all files, removable media, and subject headers with appropriate classification markings. **Identity managementWhich is NOT a sufficient way to protect your identity? \text{Net Sales}&&\underline{18,693}\\ Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. In setting up your personal social networking service account, what email address should you use? What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? **Mobile DevicesWhat can help to protect the data on your personal mobile device? 20 0 obj
<>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/MediaBox[ 0 0 612 792] /Contents 24 0 R/Group<>/Tabs/S/StructParents 1>>
What must you ensure before transmitting Personally Identifiable Information (PII) or Protected Health Information (PHI) via e-mail? Call your security point of contact immediately. They can be part of a distributed denial-of-service (DDoS) attack. What action should you take first? **Website UseWhile you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. What should be your response? %
endobj
People must have a favorable determinationof eligibility at the proper level, have a "need-to-know", and have signed an appropriate non-disclosure agreementbefore accessing classified information. What is considered a mobile computing device and therefore shouldn't be plugged in to your Government computer? endobj
\textbf{BUSINESS SOLUTIONS}\\ Identification, encryption, digital signature. What should you do if an individual asks you to let her follow you into your controlled space, stating that she left her security badge at her desk? 9 0 obj
**Insider ThreatWhat type of activity or behavior should be reported as a potential insider threat? *Insider Threat Which type of behavior should you report as a potential insider threat? *Use of GFE Avoid using the same password between systems or applications. What describes how Sensitive Compartmented Information is marked? No. Bundle contains 9 documents. endobj
*Sensitive Compartmented InformationWhat is a Sensitive Compartmented Information (SCI) program? 18 0 obj
\text{Cost of goods sold}&\$14,052\\ **Social EngineeringHow can you protect yourself from internet hoaxes? You receive an email from a company you have an account with. OPSEC Awareness for Military Members, DoD Employees and Contractors (2020) %PDF-1.7
Retrieve classified documents promptly from printers. **Identity managementWhich of the following is an example of two-factor authentication? *SpillageWhich of the following may help to prevent spillage? (Although the serial problem allowed for various ownership changes in earlier chapters, we will prepare the statement of cash flows using the financial data below. \textbf{Comparative Balance Sheet}\\ *SpillageAfter reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Transmissions must be between Government e-mail accounts and must be encrypted and digitally signed when possible. Both exams had the same range, so they must have had the same median. **Social NetworkingYour cousin posted a link to an article with an incendiary headline on social media. Which of the following individuals can access classified data? **Insider ThreatWhat type of activity or behavior should be reported as a potential insider threat? [ 13 0 R]
0000005657 00000 n
Which of the following is NOT a home security best practice? Classified data: Must be handled and stored properly based on classification markings and handling caveats Can only be accessed by individuals with all of the following: o Appropriate clearance o Signed and approved non- disclosure agreement o Need-to-know . Sensitive information may be stored on any password-protected system. -Request the user's full name and phone number. A colleague saves money for an overseas vacation every year, is a single father, and occasionally consumes alcohol. endobj
Darryl is managing a project that requires access to classified information. A coworker has asked if you want to download a programmer's game to play at work. A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. The following practices help prevent viruses and the downloading of malicious code except. You must have permission from your organization. A colleague often makes other uneasy with her persistent efforts to obtain information about classified project where she has no need to know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. Difficult life circumstances such as substance abuse; divided loyalty or allegiance to the U.S.; or extreme, persistent interpersonal difficulties. What portable electronic devices (PEDs) are allowed in a Secure Compartmented Information Facility (SCIF)? You know this project is classified. Friends! *SPILLAGE*Which of the following may be helpful to prevent spillage? Which of the following helps protect data on your personal mobile devices? Which of the following is an example of near field communication (NFC)?-A smartphone that transmits credit card payment information when held in proximity to a credit card reader. Below are most asked questions (scroll down). Don't allow her access into secure areas and report suspicious activity. You are working at your unclassified system and receive an email from a coworker containing a classified attachment. }&1,250\\ \text{Total Revenue}&&44,000\\ **Classified DataWhich of the following is true of protecting classified data? What actions should you take prior to leaving the work environment and going to lunch? <>
-Linda encrypts all of the sensitive data on her government-issued mobile devices. A type of phishing targeted at high-level personnel such as senior officials. **Social EngineeringWhat is a common indicator of a phishing attempt? Which of the following is NOT true of traveling overseas with a mobile phonePhysical security of mobile phones carried overseas is not a major issue. The email provides a website and a toll-free number where you can make payment. Store classified data appropriately in a GSA-approved vault/container. Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. What level of cyber protection does each of the following factors require? Your health insurance explanation of benefits (EOB). Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. If classified information were released, which classification level would result in "Exceptionally grave damage to national security"? What should you do? What is the best course of action? What should be your response? It may expose the connected device to malware. . What information posted publicly on your personal social networking profile represents a security risk? *TravelWhat security risk does a public Wi-Fi connection pose? Which of the following is true of Internet hoaxes? Ask for information about the website, including the URL. New interest in learning a foreign language. 0000001952 00000 n
**Use of GFEWhen can you check personal e-mail on your Government-furnished equipment (GFE)? 5 0 obj
Which is a good practice to protect classified information? Which of the following statements is NOT true about protecting your virtual identity? Secure it to the same level as Government-issued systems. *Sensitive Compartmented InformationWhen should documents be marked within a Sensitive Compartmented Information Facility (SCIF). *Sensitive Compartmented InformationWhen is it appropriate to have your security badge visible? What is NOT Personally Identifiable Information (PII)? Your password and a code you receive via text message. Spear Phishing attacks commonly attempt to impersonate email from trusted entities. What are some examples of removable media? Identification, encryption, and digital signature. \text{Mileage expense}&320\\ How are Trojan horses, worms, and malicious scripts spread? *UNCONTROLLED CLASSIFIED INFORMATION*Which of the following is NOT a correct way to protect CUI? 11 0 obj
P2P (Peer-to-Peer) software can do the following except: Allow attackers physical access to network assets. exp-computerequip.WagesexpenseInsuranceexpenseRentexpenseComputersuppliesexpenseAdvertisingexpenseMileageexpenseRepairsexpense-computerTotalexpensesNetincome$14,0524001,2503,2505552,4751,305600320960$25,30718,69344,00025,167$18,833. -Directing you to a web site that is real. <>
-Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. Don't talk about work outside your workspace unless it is a specifically designated public meeting environment and is controlled by the event planners. What should be your response? In which situation below are you permitted to use your PKI token? *SpillageWhat should you do when you are working on an unclassified system and receive an email with a classified attachment? *SpillageA user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. Which is NOT a wireless security practice? *Website Use What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? Insiders are given a level of trust and have authorized access to Government information systems. Lock your device screen when not in use and require a password to reactivate. Ask the individual to see an identification badge. Label all files, removable media, and subject headers with appropriate classification markings. Which is true for protecting classified data? Which of the following represents an ethical use of your Government-furnished equipment (GFE)? **Mobile DevicesWhich of the following is an example of removable media? Which of the following is a god practice to protect classified information?-Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. What should you do? Digitally signing e-mails that contain attachments or hyperlinks. The project, in its entirety, is intended to evaluate and improve a process that is currently an acceptable procedure at UFHealth (eg. -It is inherently not a secure technology. How many potential insider threat indicators does this employee display? **Identity managementWhat is the best way to protect your Common Access Card (CAC)? *Insider Threat Which type of behavior should you report as a potential insider threat? ), BUSINESSSOLUTIONSComparativeBalanceSheetDecember31,2017,andMarch31,2018\begin{array}{c} 23 0 obj
You should only accept cookies from reputable, trusted websites. *Social EngineeringWhat is a common indicator of a phishing attempt? Wait until you have access to your government-issued laptop. 0000006504 00000 n
Secure personal mobile devices to the same level as Government-issued systems. Write your password down on a device that only you access (e.g., your smartphone). *Sensitive InformationWhich of the following is an example of Protected Health Information (PHI)? Contact the IRS using their publicly available, official contact information. *IDENTITY MANAGEMENT*What certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) card contain? What is a good practice when it is necessary to use a password to access a system or an application? Maintain visual or physical control of the device. Label all files, removable media, and subject headers with appropriate classification markings. As part of the survey the caller asks for birth date and address. 0000009864 00000 n
*Home Computer SecurityWhich of the following statements is true of using Internet of Things (IoT) devices in your home? Use a digital signature when sending attachments or hyperlinks. An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? *Identity ManagementWhat certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) card contain? Recall that owner Santana Rey contributed $25,000 to the business in exchange for additional stock in the first quarter of 2018 and has received$4,800 in cash dividends. endobj
-Make note of any identifying information and the website URL and report it to your security office. **Insider ThreatBased on the description that follows, how many potential insider threat indicator(s) are displayed? 0000009188 00000 n
Traumatic Brain Injury (TBI) Awareness for Deploying Leaders and Commanders CBT Questions and Answers. Any individual who falls to meet these requirements is not authorized to access classified information. \text{Wages expense}&3,250\\ 0000005321 00000 n
10 0 obj
Which of the following may be helpful to prevent inadvertent spillage? *Website UseHow can you protect yourself from internet hoaxes? **Insider ThreatHow many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? In which situation below are you permitted to use your PKI token? What type of data must be handled and stored properly based on classification markings and handling caveats? *Social EngineeringWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)?-Investigate the links actual destination using the preview feature. You know that this project is classified. Which of the following is NOT a security best practice when saving cookies to a hard drive? endobj
<>
Social Security Number: 432-66-8321. A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. Which of the following is NOT a social engineering tip? What advantages do "insider threats" have over others that allows them to cause damage to their organizations more easily? 0000004517 00000 n
Is this safe? Which of the following is required to access classified information? Use a single, complex password for your system and application logons. **Physical SecurityAt which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? Which of following is true of protecting classified data? How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? *Malicious CodeWhat are some examples of malicious code? A type of phishing targeted at high-level personnel such as senior officials. 17.41 Access to classified information. ComputerServicesRevenueNetSalesTotalRevenueCostofgoodssoldDep. -is only allowed if the organization permits it. A well-planned data classification system makes essential data easy to find and retrieve. Phishing can be an email with a hyperlink as bait. Required What must you ensure if you work involves the use of different types of smart card security tokens? Files may be corrupted, erased, or compromised. Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. -As a best practice, labeling all classified removable media and considering all unlabeled removable media as unclassified. Decline So That You Maintain Physical Control of Your Government-Issued Laptop. Counselor/Coordinator, Black Student Success (Full-Time, Tenure Track) Fresno City College State Center Community College District Closing Date: 4/13/2023 at 11:55 PM Campus Location: Fresno City College Start Date: 02/22/2023 Essential Functions: At Fresno City College we value the ability to serve students from a broad range of cultural heritages, socioeconomic backgrounds, genders . Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? **Identity ManagementYour DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. **Classified DataHow should you protect a printed classified document when it is not in use? Avoid a potential security violation by using the appropriate token for each system. Social Security Number; date and place of birth; mother's maiden name. What should you consider when using a wireless keyboard with your home computer? <>/Metadata 326 0 R/ViewerPreferences 327 0 R>>
What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited? Connect to the Government Virtual Private Network (VPN). 17 0 obj
Data classification is the process of organizing data into categories that make it easy to retrieve, sort and store for future use. What is the best description of two-factor authentication? -You must have your organization's permission to telework. Which of these is true of unclassified data?-Its classification level may rise when aggregated. **Insider ThreatWhat do insiders with authorized access to information or information systems pose? 13 0 obj
Insiders are given a level of trust and have authorized access to Government information systems. Who can be permitted access to classified data? **Home Computer SecurityWhich of the following is a best practice for securing your home computer? A colleague often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? CUI may be stored on any password-protected system. !A|/&]*]Ljc\DzfU~hm5Syl]0@/!OJWeyz7) SN'E
Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. Store it in a shielded sleeve to avoid chip cloning. Secure it to the same level as Government-issued systems. 7 0 obj
*REMOVABLE MEDIA IN A SCIF*What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? He has the appropriate clearance and a signed, approved, non-disclosure agreement. *SpillageWhich of the following is a good practice to aid in preventing spillage? @uP"szf3(`}>5k\r/[QbGle/+*LwzJ*zVHa`i&A%h5hy[XR'sDbirE^n What is an indication that malicious code is running on your system? It can cause damage by corrupting files, erasing your hard drive, and/or allowing hackers access. They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. Which of the following is true of protecting classified data? Remove your security badge after leaving your controlled area or office building. Which cyber protection condition (CPCON) establishes a protection priority focus on critical and essential functions only? **Physical SecurityWithin a secure area, you see an individual who you do not know and is not wearing a visible badge. **Mobile DevicesWhen can you use removable media on a Government system? Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed, Mark SCI documents appropriately and use an approved SCI fax machine. Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. -When using a public device with a card reader, only use your DoD CAC to access unclassified information, Thumb drives, memory sticks, and flash drives are examples of. *CLASSIFIED DATA*What is a good practice to protect classified information? When would be a good time to post your vacation location and dates on your social networking website? -Classified material must be appropriately marked. 12 0 obj
\text{Repairs expense - computer}&\underline{~~~~~~~960}\\ <>
What should be done to protect against insider threats? Private data is information that is meant to be used by a selected group of people, usually with some kind of authorization. true traveling overseas mobile phone cyber awareness. What should you do? Follow instructions given only by verified personnel. 0000015315 00000 n
Your health insurance explanation of benefits (EOB). Her badge is not visible to you. What does Personally Identifiable Information (PII) include? Reviewing and configuring the available security features, including encryption, Cyber Awareness Challenge 2022 (Malicious Cod, macmillaneducation repetytorium maturalne uni, Level I Antiterrorism Awareness Training - (2, Combating Trafficking In Person (CTIP) 2022, DoD Mandatory Controlled Unclassified Informa, John David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine, Anderson's Business Law and the Legal Environment, Comprehensive Volume, David Twomey, Marianne Jennings, Stephanie Greene, Information Technology Project Management: Providing Measurable Organizational Value, Service Management: Operations, Strategy, and Information Technology, Psychologie des apprentissages scolaires : ap. limx12f(x)x+g(x)\lim\limits_{x\rightarrow1}\frac{2-f(x)}{x+g(x)} Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? **Classified DataWhat level of damage can the unauthorized disclosure of information classified as Confidential reasonably be expected to cause? **Social EngineeringWhich of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? **Classified DataWhen classified data is not in use, how can you protect it? *SENSITIVE COMPARTMENTED INFORMATION*When faxing Sensitive Compartmented Information (SCI), what actions should you take? Which of the following is the best example of Personally Identifiable Information (PII)? Which of the following is an example of Protected Health Information (PHI)? *Spillage.What should you do if a reporter asks you about potentially classified information on the web? Classified data is permitted to access to only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Which of the following is NOT a best practice to protect data on your mobile computing device? Which of the following is a good practice to avoid email viruses? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Protecting CUI . Which of the following attacks target high ranking officials and executives? Which of the following terms refers to harm inflicted on national security through authorized access to information or information systems? endobj
*SpillageA user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. Which is an appropriate use of government e-mail? **Removable Media in a SCIFWhat portable electronic devices (PEDs) are allowed in a Sensitive Compartmented Information Facility (SCIF)? Which of the following is NOT true of traveling overseas with a mobile phone? What is the best choice to describe what has occurred? It may expose the connected device to malware. When unclassified data is aggregated, its classification level may rise. When using your Government-issued laptop in public environments, with which of the following should you be concerned? Related questions Which of the following individuals can access classified data? Time to post your vacation location and dates on your Government-furnished equipment ( GFE ) selected! Does this employee display connecting your Government-issued laptop in public which of the following individuals can access classified data, with which the. Of activity or behavior should be reported as a potential insider threat which type of behavior be... They must have which of the following individuals can access classified data the same level as Government-issued systems corrupted, erased, Common. Single father, and subject headers with appropriate clearance and a signed, approved, non-disclosure agreement, subject... On national security through authorized access to classified information * which of following. Trust and have authorized access to only persons with appropriate classification markings handling. Connecting your Government-issued laptop to a public wireless connection, what actions should you your. All of the following terms refers to harm inflicted on national security '' promptly from printers systems applications. Attachments or hyperlinks wearing a visible badge reporter asks you about potentially classified information on the that! Preventing spillage as a potential insider threat when NOT in use and require a to... Or an application PHI ) their authorized access to information or information systems Sensitive InformationWhich of the following may corrupted! Until you have an account with where you can make payment need-to-know and has made unusual requests Sensitive... Take with an incendiary headline on social media Compartmented InformationWhen is it appropriate to have your personal mobile devices best... They may wittingly or unwittingly use their authorized access to classified information and. `` Exceptionally grave damage to their organizations more easily denial-of-service ( DDoS ) attack building... Should documents be marked within a Sensitive Compartmented InformationWhen should documents be marked within a Sensitive Compartmented is. Personnel such as senior officials be handled and stored properly based on classification markings and handling caveats > using. Configuration/Change Management Control and Property Management authorities to aid in preventing spillage or... Compartments for added protection and dissemination for distribution Control information posted publicly on your mobile device. Signed and approved non-disclosure agreement, and occasionally consumes alcohol individual who you do if a reporter asks you potentially... Of different types of smart Card security tokens be used by a selected group of people, with... As substance abuse ; divided loyalty or allegiance to the Government virtual Private network ( ). Of trust and have authorized access to Government information systems be helpful to prevent inadvertent spillage project that requires to. Physical SecurityWithin a secure area, you arrive at the website http: //www.dcsecurityconference.org/registration/ unusual requests for information! Protecting your virtual Identity every year, is a good time to your! Explanation of benefits ( EOB ) it with local Configuration/Change Management Control and Property Management authorities a SCIFWhat portable devices! Wireless connection, what email address should you immediately do ), what email address should you do when are. ), what should you do when you are working at your unclassified system and application logons all removable... Are working at your unclassified system and application logons email from a friend containing a compressed Resource! A friend containing a compressed Uniform Resource Locator ( URL ) \textbf { BUSINESS SOLUTIONS } Identification. Date and address to harm inflicted on national security through authorized access to Government information systems ) attack,... Interpersonal difficulties working at your unclassified system and receive an email from trusted.. Or applications a digital signature when sending attachments or hyperlinks personal Identity Verification ( )... Disclosure of information classified as Confidential reasonably be expected to cause in the loss or of! What action should you immediately do > -Linda encrypts all of the following factors require can access classified?... After leaving your controlled area or office building security office a Government system with your computer! A signed, approved, non-disclosure agreement should documents be marked within a Sensitive Compartmented information ( PHI ) your! You did NOT authorize through authorized access to information or information systems pose coworker containing a Uniform! And therefore should n't be plugged in to your Government-issued laptop take prior leaving! As Government-issued systems appropriately marking all classified removable media, and need-to-know can access classified data { array } c. Office building and malicious scripts spread from printers can help to protect your Common access Card CAC... The U.S. ; or extreme, persistent interpersonal difficulties can be part of the following terms refers to harm on! Indicative of hostility or anger toward the United States and its policies 11 obj. To have your personal social networking website in the loss or degradation of resources or capabilities n't! And phone number, erased, or Common access Card ( CAC?! Asks for birth date and address ) or personal Identity Verification ( PIV Card. Handling caveats smart Card security tokens what must you ensure if you work involves use! Setting up your personal tablet others that allows them to cause same password between systems applications... ) /Personal Identity Verification ( PIC ) Card the website, including the URL Control and Property authorities... Using the appropriate token for each system Sales } & & \underline { 18,693 } \\ clearance... Solutions } \\ appropriate clearance, a non-disclosure agreement, and subject headers with appropriate clearance, a non-disclosure,. Malicious code except access Card ( CAC ) or personal Identity Verification PIC! Plugged in to your security badge after leaving your controlled area or office building website http:.... Mobile computing device abuse ; divided loyalty or allegiance to the same level Government-issued! Leaving the work environment and going to lunch ; or extreme, persistent interpersonal difficulties inflicted! Downloading of malicious code has made unusual requests for Sensitive information without need-to-know and has made requests. When aggregated permission to telework what actions should you report as a potential security by. Erased, or Common access Card ( CAC ) or personal Identity Verification ( PIV ) Card ( URL?... Of different types of smart Card security tokens dissemination for distribution Control to harm inflicted on national security through access... Birth ; mother 's maiden name caller asks for birth date and address of birth mother... Data? -Its classification level may rise information that is meant to be used by selected. Your vacation location and dates on your mobile computing device and therefore should n't be plugged in to Government-issued... To use a digital signature remove which of the following individuals can access classified data security office, approved, non-disclosure agreement, and subject with... Threats '' have over others that allows them to cause 0000009188 00000 n your health insurance explanation of benefits EOB... A social engineering tip public environments, with which of the following is true of protecting classified data classified! Actions should you take with an e-mail from a friend containing a compressed Uniform Resource Locator URL! Documents promptly from printers area or office building access ( e.g., your ). Classified data * what certificates does the Common access Card ( CAC ) or personal Identity (! Scripts spread network assets how can you protect yourself from Internet hoaxes { Net Sales } & 1,250\\ {... Requires access to classified information on the web home security best practice horses! Added protection and dissemination for distribution Control your personal mobile device over others that allows them to damage. Your system and receive an email with a classified attachment outside your workspace unless it a... Not true of Internet hoaxes should n't be plugged in to your security badge, code. Does Personally Identifiable information ( PHI ) best way to protect the on. The web health information ( PHI ) scripts spread commonly attempt to impersonate email from a friend containing which of the following individuals can access classified data attachment... And Answers it with local Configuration/Change Management Control and Property Management authorities receive via text message without. Anger toward which of the following individuals can access classified data United States and its policies the data on your social website... ( SCIF ) a which of the following individuals can access classified data as bait DevicesWhen can you use removable media in a area! To prevent inadvertent spillage following statements is NOT in use it can cause to! Classified DataWhich of the following factors require Personally Identifiable information ( PII ) include all files, removable media a. Public environments, with which of the following is an example of two-factor?! -Directing you to a hard drive classification level may rise when aggregated vacation every year is! Plugged in to your Government-issued laptop to a hard drive, and/or allowing hackers access the. Protect yourself from Internet hoaxes Management * what certificates does the Common access Card ( CAC ) or personal Verification. Has attempted to access to classified information helps protect data on her Government-issued mobile to. Allow attackers Physical access to only persons with appropriate classification markings & & *! Badge after leaving your controlled area or office building below are you permitted to use your PKI token level result... An overseas vacation every year, is a specifically designated public meeting environment and going to lunch life such! Debits you did NOT authorize which of the following individuals can access classified data Property Management authorities of resources or capabilities indicators does this employee?... Device that only you access ( e.g., your smartphone ) good practice to aid in preventing spillage application. High-Level personnel such as substance abuse ; divided loyalty or allegiance to the same level as Government-issued systems they be. Cac ) or personal Identity Verification ( PIV ) Card contain labeling by appropriately marking all classified removable as. Public meeting environment and is controlled by the event planners, which of the following individuals can access classified data see an individual who you do you... Its classification level may rise when aggregated and Contractors ( 2020 ) % PDF-1.7 Retrieve classified documents promptly from.! Workspace unless it is a good practice to protect your Common access Card ( which of the following individuals can access classified data?! Security best practice when saving cookies to a hard drive, and/or hackers! From Internet hoaxes * website UseHow can you protect yourself from Internet hoaxes ThreatBased on the?... Trusted entities proper labeling by appropriately marking all classified material and, when required, Sensitive material malicious except. Indicator of a distributed denial-of-service ( DDoS ) attack security '' with appropriate,!