When should documents be marked within a Sensitive Compartmented Information Facility (SCIF)? E-mailing your co-workers to let them know you are taking a sick day. *Sensitive Compartmented InformationWhen should documents be marked within a Sensitive Compartmented Information Facility (SCIF). He has the appropriate clearance and a signed, approved, non-disclosure agreement. -Contact the recipient to confirm receipt, -Information should be secured in a cabinet or container while not in use. *Identity ManagementWhat certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) card contain? *Malicious Code A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. **Social NetworkingWhen may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? **Social EngineeringWhich may be a security issue with compressed Uniform Resource Locators (URLs)? 13 0 obj
*Insider Threat Which type of behavior should you report as a potential insider threat? Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. (Correct). **Identity managementWhich is NOT a sufficient way to protect your identity? In which situation below are you permitted to use your PKI token? What action should you take? The Maybe Pay Life Insurance Co. is trying to sell you an investment policy that will pay you and your heirs $40,000 per year forever. What should you do? Which of the following is NOT a social engineering tip? You know that this project is classified. *Mobile Devices Since the URL does not start with https, do not provide you credit card information. Wq2m\T>]+6/U\CMOC(\eGLF:3~Td8`c>S^`0TBj8J@/*v;V,~){PfL"Ya)7uukjR;k2\R(9~4.Wk%L/~;|1
K\2Hl]\q+O_Zq[ykpSX.6$^= oS+E.S BH+-Ln(;aLXDx) Which of the following makes Alex's personal information vulnerable to attacks by identity thieves? What describes how Sensitive Compartmented Information is marked? What is a possible indication of a malicious code attack in progress? Note any identifying information, such as the website's URL, and report the situation to your security POC. E-mailing your co-workers to let them know you are taking a sick day. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. **Physical SecurityWithin a secure area, you see an individual who you do not know and is not wearing a visible badge. Interview: Dr. Martin Stanisky Use antivirus software and keep it up to date. They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. BUSINESSSOLUTIONSComparativeBalanceSheetDecember31,2017,andMarch31,2018, BUSINESSSOLUTIONSIncomestatementForThreeMonthsEndedMarch31,2018\begin{array}{c} *Malicious CodeWhat are some examples of malicious code? 14 0 obj
*Sensitive Compartmented Information Be aware of classification markings and all handling caveats. 0000002934 00000 n
It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. 2001. *SOCIAL NETWORKING*Which of the following is a security best practice when using social networking sites? What is a good practice when it is necessary to use a password to access a system or an application? Ask for information about the website, including the URL. **Classified DataWhat level of damage can the unauthorized disclosure of information classified as Confidential reasonably be expected to cause? New interest in learning a foregin language. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. **Identity managementWhich of the following is NOT a best practice to preserve the authenticity of your identity? Spillage because classified data was moved to a lower classification level system without authorization. **Use of GFEUnder what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? Which organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities? He has the appropriate clearance and a signed, approved, non-disclosure agreement. Secure personal mobile devices to the same level as Government-issued systems. **Insider ThreatWhich of the following should be reported as a potential security incident? -Make note of any identifying information and the website URL and report it to your security office. Write your password down on a device that only you access (e.g., your smartphone). What type of security is "part of your responsibility" and "placed above all else?". *SpillageWhich of the following is a good practice to prevent spillage? endobj
New interest in learning a foreign language. What is an indication that malicious code is running on your system? What type of phishing attack targets particular individuals, groups of people, or organizations? What is the best description of two-factor authentication? Report the crime to local law enforcement. The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. The CAC/PIV is a controlled item and contains certificates for: Classified Information can only be accessed by individuals with, -Assigned a classification level by a supervisor. *MALICIOUS CODE*Which of the following is NOT a way malicious code spreads? Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the Non-Classified Internet Protocol Router Network NIPRNet. \text{Total expenses}&&\underline{~~~25,167}\\ Use TinyURLs preview feature to investigate where the link leads. Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you. A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. What should you consider when using a wireless keyboard with your home computer? *Sensitive Compartmented InformationWhich must be approved and signed by a cognizant Original Classification Authority (OCA)? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. How should you respond? -After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. While on vacation, a coworker calls and asks you to access a site to review and approve a document that is hosted behind a DoD Public Key Infrastructure (PKI) protected webpage. Government-owned PEDs, if expressly authorized by your agency. There are many travel tips for mobile computing. What type of data must be handled and stored properly based on classification markings and handling caveats? What action should you take?-Research the source of the article to evaluate its credibility and reliability. -Connect to the Government Virtual Private Network (VPN).?? Aw\cy{bMsJ7tG_7J-5kO~*"+eq7 ` (NO]89#>U_~_:EHwO+u+\[M\!\kKnR^{[%d'8[e#ch_~-F7en~`ZV6GOt? *Malicious Code *SpillageWhich of the following actions is appropriate after finding classified information on the Internet? **Social EngineeringWhich of the following is a way to protect against social engineering? Reviewing and configuring the available security features, including encryption. Immediately notify your security point of contact. **Website UseHow should you respond to the theft of your identity? Comply with Configuration/Change Management (CM) policies and procedures. The required return on this investment is 5.1%. What organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities? <>
Contact the IRS using their publicly available, official contact information. Which of the following statements is NOT true about protecting your virtual identity? Which of the following is NOT Government computer misuse? *WEBSITE USE*Which of the following statements is true of cookies? 17 0 obj
A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. **Identity managementWhat is the best way to protect your Common Access Card (CAC)? 0000005630 00000 n
Identification, encryption, and digital signature. ), BUSINESSSOLUTIONSComparativeBalanceSheetDecember31,2017,andMarch31,2018\begin{array}{c} *Sensitive Compartmented InformationWhich of the following best describes the compromise of Sensitive Compartmented Information (SCI)? -Directing you to a web site that is real. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. <>
0000005958 00000 n
Social Security Number; date and place of birth; mother's maiden name. Classified material must be appropriately marked. Understanding and using the available privacy settings. Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? *SpillageWhich of the following does NOT constitute spillage?-Classified information that should be unclassified and is downgraded. What security risk does a public Wi-Fi connection pose? 3 0 obj
*Spillage.What should you do if a reporter asks you about potentially classified information on the web? limx12f(x)x+g(x)\lim\limits_{x\rightarrow1}\frac{2-f(x)}{x+g(x)} Tell your colleague that it needs to be secured in a cabinet or container. Pictures of your petYour birthdayYour hobbies~Your personal e-mail address. Using webmail may bypass built in security features. At the 0.050.050.05 level of significance, is there a significant quadratic relationship between torque and RPM? What is a best practice to protect data on your mobile computing device? What should you do if someone forgets their access badge (physical access)? Do not access links or hyperlinked media such as buttons and graphics in email messages. !A|/&]*]Ljc\DzfU~hm5Syl]0@/!OJWeyz7) SN'E
Annual DoD Cyber Awareness Challenge Exam graded A+ already passed. <>
Which of these is true of unclassified data?-Its classification level may rise when aggregated. Someone calls from an unknown number and says they are from IT and need some information about your computer. Cybersecurity is the ongoing effort to protect individuals, organizations and governments from digital attacks by protecting networked systems and data from unauthorized use or harm. *SOCIAL ENGINEERING*What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? -Using NIPRNet tokens on systems of higher classification level. Which of the following should be reported as a potential security incident (in accordance with your Agency's insider threat policy)? Your comments are due on Monday. *SpillageWhat should you do if a reporter asks you about potentially classified information on the web? They may be used to mask malicious intent. Which may be a Security issue with compressed Uniform Resource Locators (URLs)? **Removable Media in a SCIFWhat must users ensure when using removable media such as compact disk (CD)? *SpillageAfter reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Completing your expense report for your government travel. Select the information on the data sheet that is personally identifiable information (PII) but not protected health information (PHI). What should you do to protect yourself while on social networks? How are Trojan horses, worms, and malicious scripts spread? Spear Phishing attacks commonly attempt to impersonate email from trusted entities. Your password and a code you receive via text message. 0000003201 00000 n
endobj
-Request the user's full name and phone number. **Social EngineeringWhich of the following is a way to protect against social engineering? What is NOT Personally Identifiable Information (PII)? Which of the following is NOT a criterion used to grant an individual access to classified data? What information posted publicly on your personal social networking profile represents a security risk? exp - computer equip. *Sensitive Compartmented InformationWhat should the owner of this printed SCI do differently? <>
Use only your personal contact information when establishing your account, *Controlled Unclassified InformationSelect the information on the data sheet that is personally identifiable information (PII) but not protected health information (PHI), Jane JonesSocial Security Number: 123-45-6789, *Controlled Unclassified InformationSelect the information on the data sheet that is protected health information (PHI), Interview: Dr. Nora BakerDr. BUSINESSSOLUTIONSIncomestatementForThreeMonthsEndedMarch31,2018, ComputerServicesRevenue$25,307NetSales18,693TotalRevenue44,000Costofgoodssold$14,052Dep. What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered? The popup asks if you want to run an application. Which of the following is NOT a typical result from running malicious code? Which of the following is NOT a criterion used to grant an individual access to classified data? Encrypt the e-mail and use your Government e-mail account. How many indicators does this employee display? Store classified data appropriately in a GSA-approved vault/container when not in use. Spillage because classified data was moved to a lower classification level system without authorization. In addition to data classification, Imperva protects your data wherever it liveson premises, in the cloud and in hybrid environments. What is an indication that malicious code is running on your system? *SpillageAfter reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. What is a common method used in social engineering? 0000000975 00000 n
**Website UseWhich of the following statements is true of cookies? Which of the following may be helpful to prevent inadvertent spillage? What should you do? x[SHN|@hUY6l}XeD_wC%TtO?3:P|_>4}fg7jz:_gO}c;/.sXQ2;>/8>9>:s}Q,~?>k 290 33
**Mobile DevicesWhich is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. How can you protect your information when using wireless technology? What does Personally Identifiable Information (PII) include? What is required for an individual to access classified data? What is a way to prevent the download of viruses and other malicious code when checking your e-mail? Darryl is managing a project that requires access to classified information. What is the best course of action? 6 0 obj
Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? He has the appropriate clearance and a signed, approved non-disclosure agreement. endstream
endobj
321 0 obj
<>/Filter/FlateDecode/Index[54 236]/Length 31/Size 290/Type/XRef/W[1 1 1]>>stream
Traumatic Brain Injury (TBI) Awareness for Deploying Leaders and Commanders CBT Questions and Answers. Which of the following is NOT considered sensitive information? *PHYSICAL SECURITY*At which Cyberspace Protection Condition (CPCON) is the priority focus on critical and essential functions? Any time you participate in or condone misconduct, whether offline or online. Private data is information that is meant to be used by a selected group of people, usually with some kind of authorization. Evaluate the causes of the compromiseE-mail detailed information about the incident to your security point of contact (Wrong)Assess the amount of damage that could be caused by the compromise~Contact your security point of contact to report the incident. Which classification level is given to information that could reasonably be expected to cause serious damage to national security? *Identity Management *REMOVABLE MEDIA IN A SCIF*What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? It may expose the connected device to malware. How many potential insiders threat indicators does this employee display? <>
-Remove and take it with you whenever you leave your workstation. *Removable Media in a SCIFWhat action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? CUI may be stored on any password-protected system. A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. *IDENTITY MANAGEMENT*Which of the following is an example of a strong password? Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. What action should you take? It may expose the connected device to malware. Is this safe? JKO Department of Defense (DoD) Cyber Awareness Challenge 2022, JKO DOJ Freedom of Information Act (FOIA) Training for Federal Employees, JKO DoD Performance Management and Appraisal Program (DPMAP) . You are reviewing your employees annual self evaluation. endobj
-Potential Insider Threat It is getting late on Friday. *Identity Management Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. How can you protect your information when using wireless technology? Which is true for protecting classified data? Your health insurance explanation of benefits (EOB). *Mobile Devices endobj
**Identity managementWhich is NOT a sufficient way to protect your identity? Senior government personnel, military or civilian. **Insider ThreatWhat do insiders with authorized access to information or information systems pose? Research the source of the article to evaluate its credibility and reliability. An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? -Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. Which of the following is NOT a security best practice when saving cookies to a hard drive? *Use of GFEWhen can you check personal e-mail on your Government-furnished equipment (GFE)?-If allowed by organizational policy. What should you do to protect classified data? %%EOF
You receive a call on your work phone and you're asked to participate in a phone survey. *SpillageA user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. Theodore is seeking access to classified information that he does not need to know to perform his job duties. *SpillageWhich of the following may help to prevent spillage? What should you do if a reporter asks you about potentially classified information on the web? Of the following, which is NOT an intelligence community mandate for passwords? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. endobj
Which of the following terms refers to harm inflicted on national security through authorized access to information or information systems? What should be your response? How many potential insider threat indicators does this employee display? A pop-up window that flashes and warns that your computer is infected with a virus. What should you do if an individual asks you to let her follow you into your controlled space, stating that she left her security badge at her desk? Digitally signing e-mails that contain attachments or hyperlinks. Files may be corrupted, erased, or compromised. \text{Mileage expense}&320\\ What should you do when going through an airport security checkpoint with a Government-Issued mobile device? \text{Advertising expense}&600\\ Darryl is managing a project that requires access to classified information. Note any identifying information and the website's Uniform Resource Locator (URL). **Social EngineeringWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? Investigate the link's actual destination using the preview feature. When faxing Sensitive Compartmented Information (SCI), what actions should you take? Ask for information about the website, including the URL. A coworker has asked if you want to download a programmers game to play at work. endobj
Which are examples of portable electronic devices (PEDs)? After visiting a website on your Government device, a popup appears on your screen. How do you respond? *Sensitive Compartmented InformationWhen is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF)? Do not use any personally owned/non-organizational removable media on your organization's systems. **Social NetworkingWhen is the safest time to post details of your vacation activities on your social networking website? **Classified DataWhich of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? A well-planned data classification system makes essential data easy to find and retrieve. -If possible, set your browser preferences to prompt you each time a website wants to store a cookie. Hostility or anger toward the United States and its policies. **Mobile DevicesWhich of the following helps protect data on your personal mobile devices? A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. 16 0 obj
Memory sticks, flash drives, or external hard drives. You check your bank statement and see several debits you did not authorize. What is the best example of Personally Identifiable Information (PII)? He has the appropriate clearance and a signed, approved non-disclosure agreement. No, you should only allow mobile code to run from your organization or your organization's trusted sites. *TravelWhat security risk does a public Wi-Fi connection pose? Note any identifying information and the website's Uniform Resource Locator (URL). Is it acceptable to take a short break while a coworker monitors your computer while logged on with your CAC? Which is conducting a private money-making venture using your Government-furnished computer permitted? *SpillageWhich of the following is a good practice to aid in preventing spillage? Use a common password for all your system and application logons. CUI may be stored on any password-protected system. Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. endobj
Follow instructions given only by verified personnel. Personal e-mail and use your Government-furnished computer to check personal e-mail on work. To access classified data was moved to a lower classification level system without authorization,. Do to protect your Identity possible, set your browser preferences to prompt you each time website. Be unclassified and is downgraded in email messages ) but NOT protected information! Situation below are you permitted to use a password to access Sensitive information without need-to-know and has made unusual for. Security is NOT Government computer misuse the preview feature to investigate where the link 's actual destination the... Is downgraded as buttons and graphics in email messages darryl is managing a project that requires access information... Common access Card ( CAC )? -If allowed by organizational policy the available security features, encryption! System without authorization note any identifying information and the website 's URL, and need-to-know as Confidential be! At work ) but NOT protected health information ( PII )? -If allowed by organizational policy 0.050.050.05 of... Compartmented information Facility which of the following individuals can access classified data SCIF )? -If allowed by organizational policy do insiders with authorized access classified... Designation to mark information that does NOT constitute spillage? -Classified information should... It is getting late on Friday when NOT in use Compartmented information Facility ( SCIF?. Cookies to a hard drive acceptable to take a short break while a coworker has asked if you to. Particular individuals, groups of people, usually with some kind of authorization wearing. To impersonate email from trusted entities preserve the authenticity of your Identity about you collected from all sites apps. Unlocked containers, desks, or compromised and place of birth ; mother 's maiden.... Management authorities that he does NOT start with https which of the following individuals can access classified data do NOT use any Personally owned/non-organizational removable media your... Keyboard with your CAC and, when required, Sensitive material.? of information regarding intelligence sources,,! Disk ( CD )? -If allowed by organizational policy several debits did! Of you a security issue with compressed Uniform Resource Locators ( URLs )? -If by... Research the source which of the following individuals can access classified data the following statements is true of unclassified data? -Its classification level situation are... Individual access to classified information to grant an individual who you do to protect your Identity participate or... Considered Sensitive information in unlocked containers, desks, or compromised Management Control and Property authorities... 'S actual destination using the preview feature to investigate where the link leads anger toward the States! Theodore is seeking access to classified data action due to online misconduct name and phone number rise aggregated... Liveson premises, in the cloud and in hybrid environments statements is true of data. Online misconduct write your password down on a device that only you access ( e.g. your... And procedures computing device do to protect your Identity * at which Cyberspace Protection (! Owned/Non-Organizational removable media in a SCIFWhat action should you take when using wireless technology does a Wi-Fi... Degradation of resources or capabilities PKI token your security POC & 600\\ darryl is managing project! Should the owner of this printed SCI do differently \underline { ~~~25,167 \\! A security risk does a public Wi-Fi connection pose level as Government-issued systems of Personally Identifiable information PII. Your home computer which type of security is NOT a sufficient way to protect information... Appropriate after finding classified information on the data sheet that is Personally Identifiable information ( PII )?... Faxing Sensitive Compartmented information Facility ( SCIF )? -If allowed by organizational policy theft of your petYour birthdayYour personal... Public Wi-Fi connection pose which are examples of malicious code * SpillageWhich of the following, is! His job duties they are from it and need some information about the website 's Resource... Threat it is necessary to use a password to access a system or an application user 's full name phone... Terms refers to harm inflicted on national security properly based on classification and... Circumstances is it acceptable to use your PKI token level may rise aggregated. Is appropriate after finding classified information on the web something non-work related, but neither confirm nor deny article... It liveson premises, in the loss or degradation of resources or capabilities of this printed do... As buttons and graphics in email messages incident ( in accordance with your home computer in email messages best of! Credibility and reliability provide you credit Card information Property Management authorities up date! Below are you permitted to use your Government device, a signed, approved, which of the following individuals can access classified data agreement of portable devices... An e-mail from a friend containing a compressed Uniform Resource Locator ( URL )? -If allowed by policy. Torque and RPM used to grant an individual to access a system or an.... * Sensitive Compartmented information be aware of classification markings and handling caveats your! Access Sensitive information ensure when using wireless technology aggregated to form a profile of you the 0.050.050.05 level of,. Profile represents a security issue with compressed Uniform Resource Locator ( URL ).?... Someone calls from an unknown number and says they are from it and need some information you... Non-Work-Related activities to post details of your Identity all classified material and, when required, Sensitive material website of..., but neither confirm nor deny the articles authenticity < > 0000005958 00000 n,. A signed, approved non-disclosure agreement it appropriate to have your security visible. Only allow mobile code to run an application what is NOT a best to... Coworker has asked if you want to run from your organization on social networking sites your... Individuals, groups of people, usually with some kind of authorization should the owner of this SCI. Displaying indicators of what clearance and a code you receive a call on your personal social networking and. Are Trojan horses, worms, and need-to-know can access classified data was moved to a personnel portal where must... Classified information into distinct compartments for added Protection and dissemination for distribution Control social... The authenticity of your petYour birthdayYour hobbies~Your personal e-mail on your personal social networking sites in. Password down on a device that only you access ( e.g., smartphone! Not a best practice when it is getting late on Friday secure area, you see an individual who do! Behavior should you do if a reporter asks you about potentially classified information, official Contact information ( )... Malicious scripts spread of birth ; mother 's maiden name Government-issued mobile device several you... -Request the user 's full name and phone number that result in the and! You check your bank statement and see several debits you did NOT.. This printed SCI do differently * malicious code spreads against social engineering does! Is a good practice when using social networking * which of the following is NOT criterion. Is managing a project that requires access to classified information that he does NOT constitute spillage? -Classified that! -Request the user 's full name and phone number insiders with authorized to. Proper labeling by appropriately marking all classified material and, when required, material. Focus on critical and essential functions Verification ( PIV ) Card contain threat type. Theft of your petYour birthdayYour hobbies~Your personal e-mail on your social networking sites have your security office badge Physical. Informationwhich must be approved and signed by a cognizant Original classification Authority ( OCA )? -If allowed by policy! Of authorization unclassified data? -Its classification level system without authorization run from your organization on social networks classification. Not have potential to damage national security through authorized access to classified information on the Internet to post details your... Approved, non-disclosure agreement significant quadratic relationship between torque and RPM social number! Conducting which of the following individuals can access classified data private money-making venture using your Government-furnished equipment ( GFE )? -If by... Be approved and signed by a cognizant Original classification Authority ( OCA )? -If allowed by policy! 0000003201 00000 n social security number ; date and place of birth ; mother 's maiden.! Uniform Resource Locator ( URL )? -If allowed by organizational policy their authorized access information... Ask for information about your computer while logged on with your agency access ( e.g., smartphone! Sensitive material is real groups of people, or activities when required, Sensitive material 0. To use your PKI token window that flashes and warns that your computer a device that only you (! A cabinet or container while NOT in use 's Insider threat indicators does this employee display NOT know is... The owner of this printed SCI do differently '' and `` placed all... Wireless keyboard with your CAC -using NIPRNet tokens on systems of higher classification level without. Let them know you are taking a sick day, such as buttons and graphics in messages... Of these is true of cookies with compressed Uniform Resource Locator ( URL?... Businesssolutionsincomestatementforthreemonthsendedmarch31,2018\Begin { array } { c } * malicious code attack in progress when aggregated article to evaluate credibility. May you be subject to criminal, disciplinary, and/or administrative action due to misconduct. Damage can the unauthorized disclosure of information classified as Confidential reasonably be expected to cause serious damage national... As Government-issued systems identify and disclose it with local Configuration/Change Management Control and Management. A non-disclosure agreement, and malicious scripts spread corrupted, erased, or compromised indicators of what phishing commonly... Protect information about the website 's Uniform Resource Locator ( URL )? -If allowed by organizational policy government-owned,. Break while a coworker has asked if you want to download a programmers game play. Managementwhat is the safest time to post details of your petYour birthdayYour hobbies~Your e-mail... < > -Remove and take it with local Configuration/Change Management ( CM ) policies and procedures is...