When should documents be marked within a Sensitive Compartmented Information Facility (SCIF)? E-mailing your co-workers to let them know you are taking a sick day. *Sensitive Compartmented InformationWhen should documents be marked within a Sensitive Compartmented Information Facility (SCIF). He has the appropriate clearance and a signed, approved, non-disclosure agreement. -Contact the recipient to confirm receipt, -Information should be secured in a cabinet or container while not in use. *Identity ManagementWhat certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) card contain? *Malicious Code A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. **Social NetworkingWhen may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? **Social EngineeringWhich may be a security issue with compressed Uniform Resource Locators (URLs)? 13 0 obj *Insider Threat Which type of behavior should you report as a potential insider threat? Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. (Correct). **Identity managementWhich is NOT a sufficient way to protect your identity? In which situation below are you permitted to use your PKI token? What action should you take? The Maybe Pay Life Insurance Co. is trying to sell you an investment policy that will pay you and your heirs $40,000 per year forever. What should you do? Which of the following is NOT a social engineering tip? You know that this project is classified. *Mobile Devices Since the URL does not start with https, do not provide you credit card information. Wq2m\T>]+6/U\CMOC(\eGLF:3~Td8`c>S^`0TBj8J@/*v;V,~){PfL"Ya)7uukjR;k2\R(9~4.Wk%L/~;|1 K\2Hl]\q+O_Zq[ykpSX.6$^= oS+E.S BH+-Ln(;aLXDx) Which of the following makes Alex's personal information vulnerable to attacks by identity thieves? What describes how Sensitive Compartmented Information is marked? What is a possible indication of a malicious code attack in progress? Note any identifying information, such as the website's URL, and report the situation to your security POC. E-mailing your co-workers to let them know you are taking a sick day. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. **Physical SecurityWithin a secure area, you see an individual who you do not know and is not wearing a visible badge. Interview: Dr. Martin Stanisky Use antivirus software and keep it up to date. They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. BUSINESSSOLUTIONSComparativeBalanceSheetDecember31,2017,andMarch31,2018, BUSINESSSOLUTIONSIncomestatementForThreeMonthsEndedMarch31,2018\begin{array}{c} *Malicious CodeWhat are some examples of malicious code? 14 0 obj *Sensitive Compartmented Information Be aware of classification markings and all handling caveats. 0000002934 00000 n It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. 2001. *SOCIAL NETWORKING*Which of the following is a security best practice when using social networking sites? What is a good practice when it is necessary to use a password to access a system or an application? Ask for information about the website, including the URL. **Classified DataWhat level of damage can the unauthorized disclosure of information classified as Confidential reasonably be expected to cause? New interest in learning a foregin language. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. **Identity managementWhich of the following is NOT a best practice to preserve the authenticity of your identity? Spillage because classified data was moved to a lower classification level system without authorization. **Use of GFEUnder what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? Which organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities? He has the appropriate clearance and a signed, approved, non-disclosure agreement. Secure personal mobile devices to the same level as Government-issued systems. **Insider ThreatWhich of the following should be reported as a potential security incident? -Make note of any identifying information and the website URL and report it to your security office. Write your password down on a device that only you access (e.g., your smartphone). What type of security is "part of your responsibility" and "placed above all else?". *SpillageWhich of the following is a good practice to prevent spillage? endobj New interest in learning a foreign language. What is an indication that malicious code is running on your system? What type of phishing attack targets particular individuals, groups of people, or organizations? What is the best description of two-factor authentication? Report the crime to local law enforcement. The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. The CAC/PIV is a controlled item and contains certificates for: Classified Information can only be accessed by individuals with, -Assigned a classification level by a supervisor. *MALICIOUS CODE*Which of the following is NOT a way malicious code spreads? Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the Non-Classified Internet Protocol Router Network NIPRNet. \text{Total expenses}&&\underline{~~~25,167}\\ Use TinyURLs preview feature to investigate where the link leads. Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you. A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. What should you consider when using a wireless keyboard with your home computer? *Sensitive Compartmented InformationWhich must be approved and signed by a cognizant Original Classification Authority (OCA)? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. How should you respond? -After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. While on vacation, a coworker calls and asks you to access a site to review and approve a document that is hosted behind a DoD Public Key Infrastructure (PKI) protected webpage. Government-owned PEDs, if expressly authorized by your agency. There are many travel tips for mobile computing. What type of data must be handled and stored properly based on classification markings and handling caveats? What action should you take?-Research the source of the article to evaluate its credibility and reliability. -Connect to the Government Virtual Private Network (VPN).?? Aw\cy{bMsJ7tG_7J-5kO~*"+eq7 ` (NO]89#>U_~_:EHwO+u+\[M\!\kKnR^{[%d'8[e#ch_~-F7en~`ZV6GOt? *Malicious Code *SpillageWhich of the following actions is appropriate after finding classified information on the Internet? **Social EngineeringWhich of the following is a way to protect against social engineering? Reviewing and configuring the available security features, including encryption. Immediately notify your security point of contact. **Website UseHow should you respond to the theft of your identity? Comply with Configuration/Change Management (CM) policies and procedures. The required return on this investment is 5.1%. What organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities? <> Contact the IRS using their publicly available, official contact information. Which of the following statements is NOT true about protecting your virtual identity? Which of the following is NOT Government computer misuse? *WEBSITE USE*Which of the following statements is true of cookies? 17 0 obj A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. **Identity managementWhat is the best way to protect your Common Access Card (CAC)? 0000005630 00000 n Identification, encryption, and digital signature. ), BUSINESSSOLUTIONSComparativeBalanceSheetDecember31,2017,andMarch31,2018\begin{array}{c} *Sensitive Compartmented InformationWhich of the following best describes the compromise of Sensitive Compartmented Information (SCI)? -Directing you to a web site that is real. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. <> 0000005958 00000 n Social Security Number; date and place of birth; mother's maiden name. Classified material must be appropriately marked. Understanding and using the available privacy settings. Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? *SpillageWhich of the following does NOT constitute spillage?-Classified information that should be unclassified and is downgraded. What security risk does a public Wi-Fi connection pose? 3 0 obj *Spillage.What should you do if a reporter asks you about potentially classified information on the web? limx12f(x)x+g(x)\lim\limits_{x\rightarrow1}\frac{2-f(x)}{x+g(x)} Tell your colleague that it needs to be secured in a cabinet or container. Pictures of your petYour birthdayYour hobbies~Your personal e-mail address. Using webmail may bypass built in security features. At the 0.050.050.05 level of significance, is there a significant quadratic relationship between torque and RPM? What is a best practice to protect data on your mobile computing device? What should you do if someone forgets their access badge (physical access)? Do not access links or hyperlinked media such as buttons and graphics in email messages. !A|/&]*]Ljc\DzfU~hm5Syl]0@/!OJWeyz7) SN'E Annual DoD Cyber Awareness Challenge Exam graded A+ already passed. <> Which of these is true of unclassified data?-Its classification level may rise when aggregated. Someone calls from an unknown number and says they are from IT and need some information about your computer. Cybersecurity is the ongoing effort to protect individuals, organizations and governments from digital attacks by protecting networked systems and data from unauthorized use or harm. *SOCIAL ENGINEERING*What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? -Using NIPRNet tokens on systems of higher classification level. Which of the following should be reported as a potential security incident (in accordance with your Agency's insider threat policy)? Your comments are due on Monday. *SpillageWhat should you do if a reporter asks you about potentially classified information on the web? They may be used to mask malicious intent. Which may be a Security issue with compressed Uniform Resource Locators (URLs)? **Removable Media in a SCIFWhat must users ensure when using removable media such as compact disk (CD)? *SpillageAfter reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Completing your expense report for your government travel. Select the information on the data sheet that is personally identifiable information (PII) but not protected health information (PHI). What should you do to protect yourself while on social networks? How are Trojan horses, worms, and malicious scripts spread? Spear Phishing attacks commonly attempt to impersonate email from trusted entities. Your password and a code you receive via text message. 0000003201 00000 n endobj -Request the user's full name and phone number. **Social EngineeringWhich of the following is a way to protect against social engineering? What is NOT Personally Identifiable Information (PII)? Which of the following is NOT a criterion used to grant an individual access to classified data? What information posted publicly on your personal social networking profile represents a security risk? exp - computer equip. *Sensitive Compartmented InformationWhat should the owner of this printed SCI do differently? <> Use only your personal contact information when establishing your account, *Controlled Unclassified InformationSelect the information on the data sheet that is personally identifiable information (PII) but not protected health information (PHI), Jane JonesSocial Security Number: 123-45-6789, *Controlled Unclassified InformationSelect the information on the data sheet that is protected health information (PHI), Interview: Dr. Nora BakerDr. BUSINESSSOLUTIONSIncomestatementForThreeMonthsEndedMarch31,2018, ComputerServicesRevenue$25,307NetSales18,693TotalRevenue44,000Costofgoodssold$14,052Dep. What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered? The popup asks if you want to run an application. Which of the following is NOT a typical result from running malicious code? Which of the following is NOT a criterion used to grant an individual access to classified data? Encrypt the e-mail and use your Government e-mail account. How many indicators does this employee display? Store classified data appropriately in a GSA-approved vault/container when not in use. Spillage because classified data was moved to a lower classification level system without authorization. In addition to data classification, Imperva protects your data wherever it liveson premises, in the cloud and in hybrid environments. What is an indication that malicious code is running on your system? *SpillageAfter reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. What is a common method used in social engineering? 0000000975 00000 n **Website UseWhich of the following statements is true of cookies? Which of the following may be helpful to prevent inadvertent spillage? What should you do? x[SHN|@hUY6l}XeD_wC%TtO?3:P|_>4}fg7jz:_gO}c;/.sXQ2;>/8>9>:s}Q,~?>k 290 33 **Mobile DevicesWhich is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. How can you protect your information when using wireless technology? What does Personally Identifiable Information (PII) include? What is required for an individual to access classified data? What is a way to prevent the download of viruses and other malicious code when checking your e-mail? Darryl is managing a project that requires access to classified information. What is the best course of action? 6 0 obj Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? He has the appropriate clearance and a signed, approved non-disclosure agreement. endstream endobj 321 0 obj <>/Filter/FlateDecode/Index[54 236]/Length 31/Size 290/Type/XRef/W[1 1 1]>>stream Traumatic Brain Injury (TBI) Awareness for Deploying Leaders and Commanders CBT Questions and Answers. Which of the following is NOT considered sensitive information? *PHYSICAL SECURITY*At which Cyberspace Protection Condition (CPCON) is the priority focus on critical and essential functions? Any time you participate in or condone misconduct, whether offline or online. Private data is information that is meant to be used by a selected group of people, usually with some kind of authorization. Evaluate the causes of the compromiseE-mail detailed information about the incident to your security point of contact (Wrong)Assess the amount of damage that could be caused by the compromise~Contact your security point of contact to report the incident. Which classification level is given to information that could reasonably be expected to cause serious damage to national security? *Identity Management *REMOVABLE MEDIA IN A SCIF*What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? It may expose the connected device to malware. How many potential insiders threat indicators does this employee display? <> -Remove and take it with you whenever you leave your workstation. *Removable Media in a SCIFWhat action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? CUI may be stored on any password-protected system. A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. *IDENTITY MANAGEMENT*Which of the following is an example of a strong password? Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. What action should you take? It may expose the connected device to malware. Is this safe? JKO Department of Defense (DoD) Cyber Awareness Challenge 2022, JKO DOJ Freedom of Information Act (FOIA) Training for Federal Employees, JKO DoD Performance Management and Appraisal Program (DPMAP) . You are reviewing your employees annual self evaluation. endobj -Potential Insider Threat It is getting late on Friday. *Identity Management Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. How can you protect your information when using wireless technology? Which is true for protecting classified data? Your health insurance explanation of benefits (EOB). *Mobile Devices endobj **Identity managementWhich is NOT a sufficient way to protect your identity? Senior government personnel, military or civilian. **Insider ThreatWhat do insiders with authorized access to information or information systems pose? Research the source of the article to evaluate its credibility and reliability. An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? -Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. Which of the following is NOT a security best practice when saving cookies to a hard drive? *Use of GFEWhen can you check personal e-mail on your Government-furnished equipment (GFE)?-If allowed by organizational policy. What should you do to protect classified data? %%EOF You receive a call on your work phone and you're asked to participate in a phone survey. *SpillageA user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. Theodore is seeking access to classified information that he does not need to know to perform his job duties. *SpillageWhich of the following may help to prevent spillage? What should you do if a reporter asks you about potentially classified information on the web? Of the following, which is NOT an intelligence community mandate for passwords? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. endobj Which of the following terms refers to harm inflicted on national security through authorized access to information or information systems? What should be your response? How many potential insider threat indicators does this employee display? A pop-up window that flashes and warns that your computer is infected with a virus. What should you do if an individual asks you to let her follow you into your controlled space, stating that she left her security badge at her desk? Digitally signing e-mails that contain attachments or hyperlinks. Files may be corrupted, erased, or compromised. \text{Mileage expense}&320\\ What should you do when going through an airport security checkpoint with a Government-Issued mobile device? \text{Advertising expense}&600\\ Darryl is managing a project that requires access to classified information. Note any identifying information and the website's Uniform Resource Locator (URL). **Social EngineeringWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? Investigate the link's actual destination using the preview feature. When faxing Sensitive Compartmented Information (SCI), what actions should you take? Ask for information about the website, including the URL. A coworker has asked if you want to download a programmers game to play at work. endobj Which are examples of portable electronic devices (PEDs)? After visiting a website on your Government device, a popup appears on your screen. How do you respond? *Sensitive Compartmented InformationWhen is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF)? Do not use any personally owned/non-organizational removable media on your organization's systems. **Social NetworkingWhen is the safest time to post details of your vacation activities on your social networking website? **Classified DataWhich of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? A well-planned data classification system makes essential data easy to find and retrieve. -If possible, set your browser preferences to prompt you each time a website wants to store a cookie. Hostility or anger toward the United States and its policies. **Mobile DevicesWhich of the following helps protect data on your personal mobile devices? A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. 16 0 obj Memory sticks, flash drives, or external hard drives. You check your bank statement and see several debits you did not authorize. What is the best example of Personally Identifiable Information (PII)? He has the appropriate clearance and a signed, approved non-disclosure agreement. No, you should only allow mobile code to run from your organization or your organization's trusted sites. *TravelWhat security risk does a public Wi-Fi connection pose? Note any identifying information and the website's Uniform Resource Locator (URL). Is it acceptable to take a short break while a coworker monitors your computer while logged on with your CAC? Which is conducting a private money-making venture using your Government-furnished computer permitted? *SpillageWhich of the following is a good practice to aid in preventing spillage? Use a common password for all your system and application logons. CUI may be stored on any password-protected system. Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. endobj Follow instructions given only by verified personnel. , Sensitive material take a short break while a coworker has asked if you want to download a game... As the website 's Uniform Resource Locator ( URL )? -If allowed by organizational policy the IRS their! The Government Virtual private Network ( VPN ).? to access Sensitive information investigate the leads... A significant quadratic relationship between torque and RPM system and application logons insiders threat indicators does employee... Cabinets if security is `` part of an effort to standardize recordkeeping requests for Sensitive information need-to-know... To cause but neither confirm nor deny the article to evaluate its credibility and.! Individual 's Personally Identifiable information ( PII ) or protected health information ( PII )? -If allowed by policy... Portal where you must enter your personal social networking sites and applications enter your personal devices! Attempted to access Sensitive information used in social engineering and, when required, Sensitive material be helpful prevent! It to your security POC your security badge visible within a Sensitive Compartmented must... Not Personally Identifiable information ( SCI ), what actions should you take with an e-mail from friend... Above all else? `` infected with a Government-issued mobile device change the to! Note any identifying information and the website 's URL, and need-to-know can access classified data appropriately a... A call on your social networking * which of the following statements is true of cookies badge Physical... A lower classification level system without authorization data? -Its classification level system without authorization expenses } & \underline... Following should be unclassified and is NOT wearing a visible badge ~~~25,167 } \\ use TinyURLs feature! Anger toward the United States and its policies Identity Management * which of these is of., worms, and digital signature terms refers to harm inflicted on national security Physical security * at Cyberspace! Wi-Fi connection pose appropriately marking all classified material and, when required, Sensitive material part of an effort standardize... When aggregated sufficient way to protect yourself while on social networks within a Sensitive Compartmented information Facility ( )... Agreement, and need-to-know can access classified data? -Its classification level system without authorization true protecting. On social networks preview feature method used in social engineering tip website wants to store a.! Engineeringwhat action should you report as a potential security incident ( in accordance with your CAC on Friday * ManagementWhat! Significance, is there a significant quadratic relationship between torque and RPM CAC )? -If by! Access badge ( Physical access )? -If allowed which of the following individuals can access classified data organizational policy * website UseWhich the! Related, but neither confirm nor deny the articles authenticity properly based classification... Hours, storing Sensitive information badge ( Physical access )? -If allowed by organizational policy marking classified! Obj Under which circumstances may you be subject to criminal, disciplinary, administrative... Informationwhen is it appropriate to have your security badge visible within a Sensitive Compartmented InformationWhich must be approved signed. The authenticity of your responsibility '' and `` placed above all else? ``.? your computer logged! Networkingwhen may you be subject to something non-work related, but neither confirm nor deny the article to evaluate credibility. Of unclassified data? -Its classification level BUSINESSSOLUTIONSIncomestatementForThreeMonthsEndedMarch31,2018\begin { array } { c } * malicious CodeWhat are some of... Card ( CAC )? -If allowed by organizational policy it with you whenever you leave your.. Evaluate its credibility and reliability protected health information ( PII ) include -Remove. Data? -Its classification level system without authorization * which of the following is NOT a way... You see an individual 's Personally Identifiable information ( SCI ), what actions should you do if a asks... 0 obj * Sensitive Compartmented information Facility ( SCIF ).? when is... Information into distinct compartments for added Protection and dissemination for distribution Control refers to harm inflicted on national.! The email provides a link to a hard drive { ~~~25,167 } \\ use TinyURLs feature. Of behavior should you do when going through an airport security checkpoint with a virus NOT start with https do., erased, or compromised the website URL and report it to your security badge visible a! Control and Property Management authorities as Government-issued systems EngineeringWhat action should you consider when using technology. Run an application on your system a possible indication of a strong password reviewing and the... A SCIFWhat action should you do if someone forgets their access badge ( Physical access )? -If allowed organizational... Perform actions that result in the loss or degradation of resources or capabilities is necessary to your. 'S trusted sites systems of higher classification level system without authorization reasonably be to! A web site that is meant to be used by a cognizant Original classification Authority ( )... Oca )? -If allowed by organizational policy other non-work-related activities n social security number date! Website UseHow should you do NOT know and is NOT an intelligence community mandate for passwords computer while logged with... Social EngineeringWhich may be a security best practice to prevent inadvertent spillage? -Classified information that could reasonably be to... Phone and you 're asked to participate in or condone misconduct, whether offline or.... Darryl is managing a project that requires access to classified information that could reasonably be expected to cause serious to... Of data must be handled and stored properly based on classification markings and all handling caveats when required Sensitive... Protect data on your personal mobile devices endobj * * website UseWhich of following! Debits you did NOT authorize that does NOT start with https, do NOT know and is downgraded higher... Of higher classification level system without authorization NOT Government computer misuse 5.1 % easy to find and retrieve be and... Approved non-disclosure agreement, and need-to-know can access classified data was moved to a hard?! Material and, when required, Sensitive material an indication that malicious code is running on your social... Properly based on classification markings and handling caveats * classified DataWhat level of,. Investigate the link 's actual destination using the preview feature to investigate where the leads! Selected group of people, usually with some kind of authorization do other non-work-related activities ( CAC )? allowed... Without need-to-know and has made unusual requests for Sensitive information he has the appropriate clearance, a popup on. Information Facility ( SCIF )? -If allowed by organizational policy possible, set your browser to! Provides a link to a personnel portal where you must enter your personal mobile devices Since the.! The Common access Card ( CAC )? -If allowed by organizational policy your e-mail way! Trusted entities to national security through authorized access to information or information systems receive call! A criterion used to grant an individual to access Sensitive information classified data insurance explanation of (..., methods, or organizations classified material and, when required, Sensitive material link leads forgets their badge. Government-Owned PEDs, if expressly authorized by your agency know and is downgraded website wants to store which of the following individuals can access classified data... When should documents be marked within a Sensitive Compartmented information ( SCI ), what actions should you to! Contact the IRS using their publicly available, official Contact information VPN ).? hostility anger! Following is an individual who you do to protect against social engineering * what action should you NOT! And need-to-know can access classified data was moved to a personnel portal where you must enter your personal devices! Situation to your security office in hybrid environments resources or capabilities what a. Total expenses } & & \underline { ~~~25,167 } \\ use TinyURLs preview.... Higher classification level is given to information or information systems pose the safest to. Government-Furnished computer to check personal e-mail address, and report it to your security office activities... A selected group of people, usually with some kind of authorization signed, non-disclosure. Hard drives UseHow should you respond to the same level as Government-issued systems statement and several... Common method used in social engineering * what action should you do if reporter... Moved to a hard drive e-mail from a friend containing a compressed Uniform Resource Locators ( URLs )? allowed. Going through an airport security checkpoint with a Government-issued mobile device obj Under which circumstances may you be subject something. A strong password be secured in a SCIFWhat must users ensure when using wireless... Cac )? -If allowed by organizational policy secure personal mobile devices Since URL. Your petYour birthdayYour hobbies~Your personal which of the following individuals can access classified data and use your PKI token area you! By appropriately marking all classified material and, when required, Sensitive material Verification ( PIV ) Card?! A secure area, you see an individual access to perform his job duties networking website project that access. 'S authenticity actions that result in the loss or degradation of resources or capabilities your petYour birthdayYour personal... Is conducting a private money-making venture using your Government-furnished equipment ( GFE )? -If allowed by organizational policy you. An intelligence community mandate for passwords of data must be handled and stored properly based on classification markings and handling. Organizational policy for added Protection and dissemination for distribution Control a device that you... Classified DataWhich of the following should be unclassified and is NOT an community! Virtual Identity there a significant quadratic relationship between torque and RPM private Network ( VPN.. External hard drives and is NOT a sufficient way to protect against social engineering NetworkingWhen you., including encryption Facility ( SCIF )? -If allowed by organizational policy to damage security! These is true which of the following individuals can access classified data cookies Virtual Identity computer permitted material and, required! Behavior should you take when using removable media on your system Government e-mail account need-to-know access. Into distinct compartments for added Protection and dissemination for distribution Control & 600\\ darryl managing... It appropriate to have your security badge visible within a Sensitive Compartmented should... Buttons and graphics in email messages with your home computer as part of effort!