{"id":117181,"date":"2023-08-28T08:55:23","date_gmt":"2023-08-28T08:55:23","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=117181"},"modified":"2023-08-28T08:55:26","modified_gmt":"2023-08-28T08:55:26","slug":"which-designation-includes-pii-and-phi-cyber-awareness-2023","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/08\/28\/which-designation-includes-pii-and-phi-cyber-awareness-2023\/","title":{"rendered":"Which Designation Includes Pii And Phi Cyber Awareness 2023"},"content":{"rendered":"\n<p>A vendor conducting a pilot program with your organization contacts you for organizational data to use in a prototype. How should you respond?<br>Refer the vendor to the appropriate personnel.<\/p>\n\n\n\n<p>When classified data is not in use, how can you protect it?<br>Store classified data appropriately in a GSA-approved vault\/container.<\/p>\n\n\n\n<p>What is the basis for handling and storage of classified data?<br>Classification markings and handling caveats.<\/p>\n\n\n\n<p>Which of the following must you do before using an unclassified laptop and peripherals in a collateral classified environment?<br>Ensure that any cameras, microphones, and Wi-Fi embedded in the laptop are physically disabled.<\/p>\n\n\n\n<p>What level of damage to national security can you reasonably expect Top secret information to cause if disclosed?<br>Exceptionally grave damage.<\/p>\n\n\n\n<p>Which of the following is true about telework?<br>You must have your organization&#8217;s permission to telework.<\/p>\n\n\n\n<p>Which of the following is true of protecting classified data?<br>Classified material must be appropriately marked.<\/p>\n\n\n\n<p>Which of the following is a reportable insider threat activity?<br>Attempting to access sensitive information without need-to-know.<\/p>\n\n\n\n<p>Which scenario might indicate a reportable insider threat?<br>a colleague removes sensitive information without seeking authorization in order to perform authorized telework.<\/p>\n\n\n\n<p>Which of the following is a potential insider threat indicator?<br>1) Unusual interest in classified information. 2) Difficult life circumstances, such as death of spouse.<\/p>\n\n\n\n<p>Which piece of information is safest to include on your social media profile?<br>Your favorite movie.<\/p>\n\n\n\n<p>Which of the following statements is true?<br>Many apps and smart devices collect and share your personal information and contribute to your online identity.<\/p>\n\n\n\n<p>How can you protect your organization on social networking sites?<br>Ensure there are no identifiable landmarks visible in any photos taken in a work setting that you post.<\/p>\n\n\n\n<p>Which is a best practice for protecting Controlled Unclassified Information (CUI)?<br>Store it in a locked desk drawer after working hours.<\/p>\n\n\n\n<p>Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)?<br>Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI.<\/p>\n\n\n\n<p>Which designation includes Personally Identifiable Information (PII) and Protected Health Information (PHI)?<br>Controlled Unclassified Information (CUI)<\/p>\n\n\n\n<p>Which of the following is NOT an example of CUI?<br>Press release data.<\/p>\n\n\n\n<p>Which of the following is NOT a correct way to protect CUI?<br>CUI may be stored on any password-protected system.<\/p>\n\n\n\n<p>Which of the following best describes good physical security?<br>Lionel stops an individual in his secure area who is not wearing a badge.<\/p>\n\n\n\n<p>Which of the following is an example of two-factor authentication?<br>A Common Access Card and Personal Identification Number.<\/p>\n\n\n\n<p>What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card?<br>Store it in a shielded sleeve.<\/p>\n\n\n\n<p>What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)?<br>Confirm the individual&#8217;s need-to-know and access.<\/p>\n\n\n\n<p>Which of the following is true of Sensitive Compartmented Information (SCI)?<br>Access requires Top Secret clearance and indoctrination into the SCI program.<\/p>\n\n\n\n<p>Which of the following is NOT a potential consequence of using removable media unsafely in a Sensitive Compartmented Information Facility (SCIF)?<br>Damage to the removable media.<\/p>\n\n\n\n<p>What portable electronic devices (PEDs) are permitted in a SCIF?<br>Only expressly authorized government-owned PEDs.<\/p>\n\n\n\n<p>What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF?<br>All of these.<\/p>\n\n\n\n<p>Which of the following is NOT a type of malicious code?<br>Executables.<\/p>\n\n\n\n<p>Which of the following actions can help tp protect your identity?<br>Shred personal documents.<\/p>\n\n\n\n<p>Which is an appropriate use of government e-mail?<br>Use a digital signature when sending attachments or hyperlinks.<\/p>\n\n\n\n<p>What type of social engineering targets particular groups of people?<br>Spear phishing.<\/p>\n\n\n\n<p>How can you protect yourself from social engineering?<br>Verify the identity of all individuals.<\/p>\n\n\n\n<p>Which of the following is true of traveling overseas with a mobile phone?<br>A personally owned device approved under Bring Your Own Approved Device (BYOAD) policy must be unenrolled while out of the country.<\/p>\n\n\n\n<p>What should Sara do when using publicly available Internet, such as hotel Wi-Fi?<br>Only connect with Government VPN.<\/p>\n\n\n\n<p>What is the danger of using public Wi-Fi connections?<br>Both of these.<\/p>\n\n\n\n<p>Which of the following personally-owned computer peripherals is permitted for use with Government-furnished equipment?<br>A headset with a microphone through a Universal Serial Bus (USB) port.<\/p>\n\n\n\n<p>How can you protect data on your mobile computing and portable electronic devices (PEDs)?<br>Enable automatic screen locking after a period of inactivity.<\/p>\n\n\n\n<p>Which of the following is an example of removable media?<br>External hard drive.<\/p>\n\n\n\n<p>Which of the following is true of Internet of Things (IoT) devices?<br>They can become an attack vector to other devices on your home network.<\/p>\n\n\n\n<p>When is it appropriate to have your security badge visible?<br>At all times when in the facility.<\/p>\n\n\n\n<p>What should the owner of this printed SCI do differently?<br>Retrieve classified documents promptly from printers.<\/p>\n\n\n\n<p>What should the participants in this conversation involving SCI do differently?<br>Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed.<\/p>\n\n\n\n<p>Which of the following demonstrates proper protection of mobile devices?<br>Linda encrypts all of the sensitive data on her government-issued mobile devices.<\/p>\n\n\n\n<p>Which of the following does NOT constitute spillage?<br>Classified information that should be unclassified and is downgraded.<\/p>\n\n\n\n<p>Which of the following is NOT an appropriate way to protect against inadvertent spillage?<br>Use the classified network for all work, including unclassified work.<\/p>\n\n\n\n<p>Which of the following should you NOT do if you find classified information on the internet?<br>Download the information.<\/p>\n\n\n\n<p>Who designates whether information is classified and its classification level?<\/p>\n\n\n\n<p>Which of the following is a good practice to protect classified information?<\/p>\n\n\n\n<p>Which of the following may help to prevent spillage?<br>Follow procedures for transferring data to and from outside agency and non-government networks.<\/p>\n\n\n\n<p>Who designates whether information is classified and its classification level?<br>Original classification authority.<\/p>\n\n\n\n<p>In addition to avoiding the temptation of greed to betray his country, what should Alex do differently?<br>Avoid talking about work outside of the workplace or with people without a need-to-know.<\/p>\n\n\n\n<p>How many insider threat indicators does Alex demonstrate?<br>Three or more.<\/p>\n\n\n\n<p>What should Alex&#8217;s colleagues do?<br>Report the suspicious behave in accordance with their organization&#8217;s threat policy.<\/p>\n\n\n\n<p>Which of the following is true?<br>Digitally signed e-mails are more secure.<\/p>\n\n\n\n<p>Which of the following best describes the conditions under which mobile devices and applications can track your location?<br>It is often the default but can be prevented by disabling the location function.<\/p>\n\n\n\n<p>When is it okay to charge a personal mobile device using government-furnished equipment (GFE)?<br>This is never okay.<\/p>\n\n\n\n<p>Which of the following demonstrates proper protection of mobile devices?<br>Linda encrypts all of the sensitive data on her government-issued mobile devices.<\/p>\n\n\n\n<p>What security risk does a public Wi-Fi connection pose?<br>It may prohibit the use of a virtual private network (VPN).<\/p>\n\n\n\n<p>Which of the following represents an ethical use of your Government-furnished equipment (GFE)?<br>Checking personal e-mail when allowed by your organization.<\/p>\n\n\n\n<p>When may you be subject to criminal, disciplinary, and\/or administrative action due to online harassment, bullying, stalking, hazing, discrimination, or retaliation?<br>If you participate in or condone it at any time.<\/p>\n\n\n\n<p>How can you protect yourself on social networking sites?<br>Validate friend requests through another source through another source before confirming them.<\/p>\n\n\n\n<p>Which piece of information is safest to include on your social media profile?<br>Photos of your pet.<\/p>\n\n\n\n<p>Which of the following is true of removable media and portable electronic devices (PEDs)?<br>They have similar features, and the same rules and protections apply to both.<\/p>\n\n\n\n<p>Which of the following is a security best practice for protecting Personally Identifiable Information (PII)?<br>Only use Government-approved equipment to process PII.<\/p>\n\n\n\n<p>Which of the following is true of Controlled Unclassified Information (CUI)?<br>CUI must be handled using safeguarding or dissemination controls.<\/p>\n\n\n\n<p>Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only?<br>CPCON 1.<\/p>\n\n\n\n<p>Which of the following is true of the Common Access Card (CAC) or Personal Identity Verification (PIV) card?<br>You should remove and take your CAC\/PIV card whenever you leave your workstation.<\/p>\n\n\n\n<p>Which of the following is an example of a strong password?<br>%2ZN=Ugq<\/p>\n\n\n\n<p>A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI________.<br>in any manner.<\/p>\n\n\n\n<p>Which of the following is a good practice to protest classified information?<br>Don&#8217;t assume open storage in a secure facility is authorized.<\/p>\n\n\n\n<p>Based on the description that follows, how many potential insider threat indicators(s) are displayed? A colleague saves money for an overseas vacation every year, is a single father, and occasionally consumes alcohol.<br>2 indicators.<\/p>\n\n\n\n<p>Which of the following statements is true?<br>Adversaries exploit social networking sites to disseminate fake news.<\/p>\n\n\n\n<p>Which of the following is true about URLs?<br>May be used to mask malicious intent.<\/p>\n\n\n\n<p>What does &#8220;spillage refer to?<br>Information improperly moved from a higher protection level to a lower protection level.<\/p>\n\n\n\n<p>Based on the description that follows, haw many potential insider threat indicator(s) are displayed? a colleague enjoys playing videos games, regularly uses social media, and frequently forgets to secure her smartphone elsewhere before entering areas where it is prohibited.<br>1 indicator<\/p>\n\n\n\n<p>A trusted friend in your social network posts a link to vaccine information on a website unknown to you. What action should you take?<br>Research the source to evaluate its credibility and reliability.<\/p>\n\n\n\n<p>Which of the following is true of the Common Access Card (CAC)?<br>It contains certificates for identification, encryption, and digital signature.<\/p>\n\n\n\n<p>Which of the following is true of portable electronic devices (PEDs) in a Sensitive Compartmented Information Facility (SCIF)?<br>only connect government-owned PEDs to the same level classification information system when authorized.<\/p>\n\n\n\n<p>Which of the following is true of downloading apps?<br>For Government-owned devices, use approved and authorized applications only.<\/p>\n\n\n\n<p>Which of the following statements is true of cookies?<br>You should confirm that a site that wants to store a cookie uses an encrypted link.<\/p>\n\n\n\n<p>What action should you take with a compressed Uniform Resource Locator (URL) on a website known to you?<br>Search for instructions on how to preview where the link actually leads.<\/p>\n\n\n\n<p>Which of the following is a best practice for using removable media?<br>Avoid inserting removable media with unknown content into your computer.<\/p>\n\n\n\n<p>How should you secure your home wireless network for teleworking?<br>Implement Wi-Fi Protected Access 2 (WPA2) Personal encryption at a minimum.<\/p>\n\n\n\n<p>Which of the following is true of protecting classified data?<br>(CLASSIFIED DATA)<br>Classified material must be appropriately marked.<\/p>\n\n\n\n<p>A vendor conducting a pilot program with your organization contacts you for organizational data to use in a prototype. How should you respond?<br>(CLASSIFIED DATA)<br>Refer the vendor to the appropriate personnel.<\/p>\n\n\n\n<p>When classified data is not in use, how can you protect it?<br>(CLASSIFIED DATA)<br>Store classified data appropriately in a GSA-approved vault\/container.<\/p>\n\n\n\n<p>What is the basis for handling and storage of classified data?<br>(CLASSIFIED DATA)<br>Classification markings and handling caveats.<\/p>\n\n\n\n<p>Which of the following is a good practice to protect classified information?<br>(CLASSIFIED DATA)<br>Don&#8217;t assume open storage in a secure facility is permitted.<\/p>\n\n\n\n<p>Which of the following must you do before using an unclassified laptop and peripherals in a collateral classified environment?<br>(CLASSIFIED DATA)<br>Ensure that any cameras, microphones, and Wi-Fi embedded in the laptop are physically disabled.<\/p>\n\n\n\n<p>What level of damage to national security can you reasonably expect Top secret information to cause if disclosed?<br>(CLASSIFIED DATA)<br>Exceptionally grave damage.<\/p>\n\n\n\n<p>How should you secure your home wireless network for teleworking?<br>(HOME COMPUTER SECURITY)<br>Implement Wi-Fi Protected Access 2 (WPA2) Personal encryption at a minimum.<\/p>\n\n\n\n<p>Which of the following is true about telework?<br>(HOME COMPUTER SECURITY)<br>You must have your organization&#8217;s permission to telework.<\/p>\n\n\n\n<p>Which of the following is a reportable insider threat activity?<br>(INSIDER THREAT)<br>Attempting to access sensitive information without need-to-know.<\/p>\n\n\n\n<p>Which scenario might indicate a reportable insider threat?<br>(INSIDER THREAT)<br>A colleague removes sensitive information without seeking authorization in order to perform authorized telework.<\/p>\n\n\n\n<p>Which of the following is a potential insider threat indicator?<br>(INSIDER THREAT)<br>1) Unusual interest in classified information.<\/p>\n\n\n\n<p>2) Difficult life circumstances, such as death of spouse.<\/p>\n\n\n\n<p>Based on the description that follows, how many potential insider threat indicator(s) are displayed?<br>A colleague saves money for an overseas vacation every year, is a single father, and occasionally consumes alcohol.<br>(INSIDER THREAT)<br>0 indicators.<\/p>\n\n\n\n<p>Which piece of information is safest to include on your social media profile?<br>(SOCIAL NETWORKING)<br>Your favorite movie.<\/p>\n\n\n\n<p>Which of the following statements is true?<br>(SOCIAL NETWORKING)<br>1) Many apps and smart devices collect and share your personal information and contribute to your online identity.<\/p>\n\n\n\n<p>2) Adversaries exploit social networking sites to disseminate fake news.<\/p>\n\n\n\n<p>How can you protect your organization on social networking sites?<br>(SOCIAL NETWORKING)<br>Ensure there are no identifiable landmarks visible in any photos taken in a work setting that you post.<\/p>\n\n\n\n<p>Which designation marks information that does not have potential to damage national security?<br>(CONTROLLED UNCLASSIFIED INFORMATION)<br>Unclassified.<\/p>\n\n\n\n<p>Which of the following is true of Unclassified information?<br>(CONTROLLED UNCLASSIFIED INFORMATION)<br>It is releasable to the public without clearance.??<\/p>\n\n\n\n<p>Which is a best practice for protecting Controlled Unclassified Information (CUI)?<br>(CONTROLLED UNCLASSIFIED INFORMATION)<br>Store it in a locked desk drawer after working hours.<\/p>\n\n\n\n<p>Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)?<br>(CONTROLLED UNCLASSIFIED INFORMATION)<br>Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI.<\/p>\n\n\n\n<p>Which designation includes Personally Identifiable Information (PII) and Protected Health Information (PHI)?<br>(CONTROLLED UNCLASSIFIED INFORMATION)<br>Controlled Unclassified Information (CUI).<\/p>\n\n\n\n<p>Which of the following is NOT an example of CUI?<br>(CONTROLLED UNCLASSIFIED INFORMATION)<br>Press release data.<\/p>\n\n\n\n<p>Which of the following is NOT a correct way to protect CUI?<br>(CONTROLLED UNCLASSIFIED INFORMATION)<br>CUI may be stored on any password-protected system.<\/p>\n\n\n\n<p>Which of the following best describes good physical security?<br>(PHYSICAL SECURITY)<br>Lionel stops an individual in his secure area who is not wearing a badge.<\/p>\n\n\n\n<p>Which of the following is a best practice for physical security?<br>(PHYSICAL SECURITY)<br>Report suspicious activity.<\/p>\n\n\n\n<p>Which of the following is an example of two-factor authentication?<br>(IDENTITY MANAGEMENT)<br>A Common Access Card and Personal Identification Number.<\/p>\n\n\n\n<p>What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card?<br>(IDENTITY MANAGEMENT)<br>Store it in a shielded sleeve.<\/p>\n\n\n\n<p>Which of the following is true of using a DoD Public Key Infrastructure (PKI) token?<br>(IDENTITY MANAGEMENT)<br>It should only be in a system while actively using it for a PKI-required task.<\/p>\n\n\n\n<p>What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)?<br>(SENSITIVE COMPARTMENTED INFORMATION)<br>Confirm the individual&#8217;s need-to-know and access.<\/p>\n\n\n\n<p>Which of the following is true of Sensitive Compartmented Information (SCI)?<br>(SENSITIVE COMPARTMENTED INFORMATION)<br>Access requires Top Secret clearance and indoctrination into the SCI program.<\/p>\n\n\n\n<p>Which of the following is NOT a potential consequence of using removable media unsafely in a Sensitive Compartmented Information Facility (SCIF)?<br>(SENSITIVE COMPARTMENTED INFORMATION)<br>Damage to the removable media.<\/p>\n\n\n\n<p>Which of the following is true of transmitting Sensitive Compartmented Information (SCI)?<br>(SENSITIVE COMPARTMENTED INFORMATION)<br>You many only transport SCI if you have been courier-briefed for SCI.<\/p>\n\n\n\n<p>A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI <strong><em>_<\/em><\/strong>.<br>(SENSITIVE COMPARTMENTED INFORMATION)<br>In any manner.<\/p>\n\n\n\n<p>What portable electronic devices (PEDs) are permitted in a SCIF?<br>(REMOVABLE MEDIA IN A SCIF)<br>Only expressly authorized government-owned PEDs.<\/p>\n\n\n\n<p>How should you label removable media used in a Sensitive Compartmented Information Facility (SCIF)?<br>(REMOVABLE MEDIA IN A SCIF)<br>With the maximum classification, date of creation, point of contact, and Change Management (CM) Control Number.<\/p>\n\n\n\n<p>What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF?<br>(REMOVABLE MEDIA IN A SCIF)<br>All of these.<\/p>\n\n\n\n<p>Which of the following is NOT a type of malicious code?<br>(MALICIOUS CODE)<br>Executables.<\/p>\n\n\n\n<p>Which of the following is a way to prevent the spread of malicious code?<br>(MALICIOUS CODE)<br>Scan all external files before uploading to your computer.<\/p>\n\n\n\n<p>Which of the following actions can help to protect your identity?<br>(WEBSITE USE)<br>Shred personal documents.<\/p>\n\n\n\n<p>Which is an appropriate use of government e-mail?<br>(SOCIAL ENGINEERING)<br>Use a digital signature when sending attachments or hyperlinks.<\/p>\n\n\n\n<p>What type of social engineering targets particular groups of people?<br>(SOCIAL ENGINEERING)<br>Spear phishing.<\/p>\n\n\n\n<p>What type of social engineering targets senior officials?<br>(SOCIAL ENGINEERING)<br>Whaling.<\/p>\n\n\n\n<p>How can you protect yourself from social engineering?<br>(SOCIAL ENGINEERING)<br>Verify the identity of all individuals.<\/p>\n\n\n\n<p>Which of the following is true?<br>(SOCIAL ENGINEERING)<br>Digitally signed e-mails are more secure.<\/p>\n\n\n\n<p>Which of the following is true of traveling overseas with a mobile phone?<br>(TRAVEL)<br>A personally owned device approved under Bring Your Own Approved Device (BYOAD) policy must be unenrolled while out of the country.<\/p>\n\n\n\n<p>Which of the following is a concern when using your Government-issued laptop in public?<br>(TRAVEL)<br>The physical security of the device.<\/p>\n\n\n\n<p>What should Sara do when using publicly available Internet, such as hotel Wi-Fi?<br>(TRAVEL)<br>Only connect with Government VPN.<\/p>\n\n\n\n<p>What is the danger of using public Wi-Fi connections?<br>(TRAVEL)<br>Both of these.<\/p>\n\n\n\n<p>Which of the following personally-owned computer peripherals is permitted for use with Government-furnished equipment?<br>(USE OF GFE)<br>A headset with a microphone through a Universal Serial Bus (USB) port.<\/p>\n\n\n\n<p>How can you protect data on your mobile computing and portable electronic devices (PEDs)?<br>(MOBILE DEVICES)<br>Enable automatic screen locking after a period of inactivity.<\/p>\n\n\n\n<p>Which of the following is NOT a risk associated with near field communication (NFC)?<br>(MOBILE DEVICES)<br>Additional data charges.<\/p>\n\n\n\n<p>Which of the following best describes the conditions under which mobile devices and applications can track your location?<br>(MOBILE DEVICES)<br>It may occur at any time without your knowledge or consent.<\/p>\n\n\n\n<p>Which of the following is an example of removable media?<br>(MOBILE DEVICES)<br>External hard drive.<\/p>\n\n\n\n<p>Which of the following is true of Internet of Things (IoT) devices?<br>They can become an attack vector to other devices on your home network.<\/p>\n\n\n\n<p>When is it appropriate to have your security badge visible?<br>At all times when in the facility.<\/p>\n\n\n\n<p>What should the owner of this printed SCI do differently?<br>Retrieve classified documents promptly from printers.<\/p>\n\n\n\n<p>What should the participants in this conversation involving SCI do differently?<br>Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed.<\/p>\n\n\n\n<p>Which of the following demonstrates proper protection of mobile devices?<br>Linda encrypts all of the sensitive data on her government-issued mobile devices.<\/p>\n\n\n\n<p>Which of the following does NOT constitute spillage?<br>(SPILLAGE)<br>Classified information that should be unclassified and is downgraded.<\/p>\n\n\n\n<p>Which of the following is NOT an appropriate way to protect against inadvertent spillage?<br>(SPILLAGE)<br>Use the classified network for all work, including unclassified work.<\/p>\n\n\n\n<p>Which of the following may help to prevent spillage?<br>(SPILLAGE)<br>Follow procedures for transferring data to and from outside agency and non-government networks.<\/p>\n\n\n\n<p>Which of the following should you NOT do if you find classified information on the internet?<br>Download the information.<\/p>\n\n\n\n<p>Who designates whether information is classified and its classification level?<\/p>\n\n\n\n<p>Which of the following is true of protecting classified data?<br>(CLASSIFIED DATA)<\/p>\n\n\n\n<p>Classified material must be appropriately marked.<\/p>\n\n\n\n<p>A vendor conducting a pilot program with your organization contacts you for organizational data to use in a prototype. How should you respond?<br>(CLASSIFIED DATA)<\/p>\n\n\n\n<p>Refer the vendor to the appropriate personnel.<\/p>\n\n\n\n<p>When classified data is not in use, how can you protect it?<br>(CLASSIFIED DATA)<\/p>\n\n\n\n<p>Store classified data appropriately in a GSA-approved vault\/container.<\/p>\n\n\n\n<p>What is the basis for handling and storage of classified data?<br>(CLASSIFIED DATA)<\/p>\n\n\n\n<p>Classification markings and handling caveats.<\/p>\n\n\n\n<p>Which of the following is a good practice to protect classified information?<br>(CLASSIFIED DATA)<\/p>\n\n\n\n<p>Don&#8217;t assume open storage in a secure facility is permitted.<\/p>\n\n\n\n<p>Which of the following must you do before using an unclassified laptop and peripherals in a collateral classified environment?<br>(CLASSIFIED DATA)<\/p>\n\n\n\n<p>Ensure that any cameras, microphones, and Wi-Fi embedded in the laptop are physically disabled.<\/p>\n\n\n\n<p>What level of damage to national security can you reasonably expect Top secret information to cause if disclosed?<br>(CLASSIFIED DATA)<\/p>\n\n\n\n<p>Exceptionally grave damage.<\/p>\n\n\n\n<p>How should you secure your home wireless network for teleworking?<br>(HOME COMPUTER SECURITY)<\/p>\n\n\n\n<p>Implement Wi-Fi Protected Access 2 (WPA2) Personal encryption at a minimum.<\/p>\n\n\n\n<p>Which of the following is true about telework?<br>(HOME COMPUTER SECURITY)<\/p>\n\n\n\n<p>You must have your organization&#8217;s permission to telework.<\/p>\n\n\n\n<p>Which of the following is a reportable insider threat activity?<br>(INSIDER THREAT)<\/p>\n\n\n\n<p>Attempting to access sensitive information without need-to-know.<\/p>\n\n\n\n<p>Which scenario might indicate a reportable insider threat?<br>(INSIDER THREAT)<\/p>\n\n\n\n<p>A colleague removes sensitive information without seeking authorization in order to perform authorized telework.<\/p>\n\n\n\n<p>Which of the following is a potential insider threat indicator?<br>(INSIDER THREAT)<\/p>\n\n\n\n<p>1) Unusual interest in classified information.<\/p>\n\n\n\n<p>2) Difficult life circumstances, such as death of spouse.<\/p>\n\n\n\n<p>Based on the description that follows, how many potential insider threat indicator(s) are displayed?<br>A colleague saves money for an overseas vacation every year, is a single father, and occasionally consumes alcohol.<br>(INSIDER THREAT)<\/p>\n\n\n\n<p>0 indicators.<\/p>\n\n\n\n<p>Which piece of information is safest to include on your social media profile?<br>(SOCIAL NETWORKING)<\/p>\n\n\n\n<p>Your favorite movie.<\/p>\n\n\n\n<p>Which of the following statements is true?<br>(SOCIAL NETWORKING)<\/p>\n\n\n\n<p>1) Many apps and smart devices collect and share your personal information and contribute to your online identity.<\/p>\n\n\n\n<p>2) Adversaries exploit social networking sites to disseminate fake news.<\/p>\n\n\n\n<p>How can you protect your organization on social networking sites?<br>(SOCIAL NETWORKING)<\/p>\n\n\n\n<p>Ensure there are no identifiable landmarks visible in any photos taken in a work setting that you post.<\/p>\n\n\n\n<p>Which designation marks information that does not have potential to damage national security?<br>(CONTROLLED UNCLASSIFIED INFORMATION)<\/p>\n\n\n\n<p>Unclassified.<\/p>\n\n\n\n<p>Which of the following is true of Unclassified information?<br>(CONTROLLED UNCLASSIFIED INFORMATION)<\/p>\n\n\n\n<p>It is releasable to the public without clearance.??<\/p>\n\n\n\n<p>Which is a best practice for protecting Controlled Unclassified Information (CUI)?<br>(CONTROLLED UNCLASSIFIED INFORMATION)<\/p>\n\n\n\n<p>Store it in a locked desk drawer after working hours.<\/p>\n\n\n\n<p>Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)?<br>(CONTROLLED UNCLASSIFIED INFORMATION)<\/p>\n\n\n\n<p>Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI.<\/p>\n\n\n\n<p>Which designation includes Personally Identifiable Information (PII) and Protected Health Information (PHI)?<br>(CONTROLLED UNCLASSIFIED INFORMATION)<\/p>\n\n\n\n<p>Controlled Unclassified Information (CUI).<\/p>\n\n\n\n<p>Which of the following is NOT an example of CUI?<br>(CONTROLLED UNCLASSIFIED INFORMATION)<\/p>\n\n\n\n<p>Press release data.<\/p>\n\n\n\n<p>Which of the following is NOT a correct way to protect CUI?<br>(CONTROLLED UNCLASSIFIED INFORMATION)<\/p>\n\n\n\n<p>CUI may be stored on any password-protected system.<\/p>\n\n\n\n<p>Which of the following best describes good physical security?<br>(PHYSICAL SECURITY)<\/p>\n\n\n\n<p>Lionel stops an individual in his secure area who is not wearing a badge.<\/p>\n\n\n\n<p>Which of the following is a best practice for physical security?<br>(PHYSICAL SECURITY)<\/p>\n\n\n\n<p>Report suspicious activity.<\/p>\n\n\n\n<p>Which of the following is an example of two-factor authentication?<br>(IDENTITY MANAGEMENT)<\/p>\n\n\n\n<p>A Common Access Card and Personal Identification Number.<\/p>\n\n\n\n<p>What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card?<br>(IDENTITY MANAGEMENT)<\/p>\n\n\n\n<p>Store it in a shielded sleeve.<\/p>\n\n\n\n<p>Which of the following is true of using a DoD Public Key Infrastructure (PKI) token?<br>(IDENTITY MANAGEMENT)<\/p>\n\n\n\n<p>It should only be in a system while actively using it for a PKI-required task.<\/p>\n\n\n\n<p>What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)?<br>(SENSITIVE COMPARTMENTED INFORMATION)<\/p>\n\n\n\n<p>Confirm the individual&#8217;s need-to-know and access.<\/p>\n\n\n\n<p>Which of the following is true of Sensitive Compartmented Information (SCI)?<br>(SENSITIVE COMPARTMENTED INFORMATION)<\/p>\n\n\n\n<p>Access requires Top Secret clearance and indoctrination into the SCI program.<\/p>\n\n\n\n<p>Which of the following is NOT a potential consequence of using removable media unsafely in a Sensitive Compartmented Information Facility (SCIF)?<br>(SENSITIVE COMPARTMENTED INFORMATION)<\/p>\n\n\n\n<p>Damage to the removable media.<\/p>\n\n\n\n<p>Which of the following is true of transmitting Sensitive Compartmented Information (SCI)?<br>(SENSITIVE COMPARTMENTED INFORMATION)<\/p>\n\n\n\n<p>You many only transport SCI if you have been courier-briefed for SCI.<\/p>\n\n\n\n<p>A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI <strong><em>_<\/em><\/strong>.<br>(SENSITIVE COMPARTMENTED INFORMATION)<\/p>\n\n\n\n<p>In any manner.<\/p>\n\n\n\n<p>What portable electronic devices (PEDs) are permitted in a SCIF?<br>(REMOVABLE MEDIA IN A SCIF)<\/p>\n\n\n\n<p>Only expressly authorized government-owned PEDs.<\/p>\n\n\n\n<p>How should you label removable media used in a Sensitive Compartmented Information Facility (SCIF)?<br>(REMOVABLE MEDIA IN A SCIF)<\/p>\n\n\n\n<p>With the maximum classification, date of creation, point of contact, and Change Management (CM) Control Number.<\/p>\n\n\n\n<p>What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF?<br>(REMOVABLE MEDIA IN A SCIF)<\/p>\n\n\n\n<p>All of these.<\/p>\n\n\n\n<p>Which of the following is NOT a type of malicious code?<br>(MALICIOUS CODE)<\/p>\n\n\n\n<p>Executables.<\/p>\n\n\n\n<p>Which of the following is a way to prevent the spread of malicious code?<br>(MALICIOUS CODE)<\/p>\n\n\n\n<p>Scan all external files before uploading to your computer.<\/p>\n\n\n\n<p>Which of the following actions can help to protect your identity?<br>(WEBSITE USE)<\/p>\n\n\n\n<p>Shred personal documents.<\/p>\n\n\n\n<p>Which is an appropriate use of government e-mail?<br>(SOCIAL ENGINEERING)<\/p>\n\n\n\n<p>Use a digital signature when sending attachments or hyperlinks.<\/p>\n\n\n\n<p>What type of social engineering targets particular groups of people?<br>(SOCIAL ENGINEERING)<\/p>\n\n\n\n<p>Spear phishing.<\/p>\n\n\n\n<p>What type of social engineering targets senior officials?<br>(SOCIAL ENGINEERING)<\/p>\n\n\n\n<p>Whaling.<\/p>\n\n\n\n<p>How can you protect yourself from social engineering?<br>(SOCIAL ENGINEERING)<\/p>\n\n\n\n<p>Verify the identity of all individuals.<\/p>\n\n\n\n<p>Which of the following is true?<br>(SOCIAL ENGINEERING)<\/p>\n\n\n\n<p>Digitally signed e-mails are more secure.<\/p>\n\n\n\n<p>Which of the following is true of traveling overseas with a mobile phone?<br>(TRAVEL)<\/p>\n\n\n\n<p>A personally owned device approved under Bring Your Own Approved Device (BYOAD) policy must be unenrolled while out of the country.<\/p>\n\n\n\n<p>Which of the following is a concern when using your Government-issued laptop in public?<br>(TRAVEL)<\/p>\n\n\n\n<p>The physical security of the device.<\/p>\n\n\n\n<p>What should Sara do when using publicly available Internet, such as hotel Wi-Fi?<br>(TRAVEL)<\/p>\n\n\n\n<p>Only connect with Government VPN.<\/p>\n\n\n\n<p>What is the danger of using public Wi-Fi connections?<br>(TRAVEL)<\/p>\n\n\n\n<p>Both of these.<\/p>\n\n\n\n<p>Which of the following personally-owned computer peripherals is permitted for use with Government-furnished equipment?<br>(USE OF GFE)<\/p>\n\n\n\n<p>A headset with a microphone through a Universal Serial Bus (USB) port.<\/p>\n\n\n\n<p>How can you protect data on your mobile computing and portable electronic devices (PEDs)?<br>(MOBILE DEVICES)<\/p>\n\n\n\n<p>Enable automatic screen locking after a period of inactivity.<\/p>\n\n\n\n<p>Which of the following is NOT a risk associated with near field communication (NFC)?<br>(MOBILE DEVICES)<\/p>\n\n\n\n<p>Additional data charges.<\/p>\n\n\n\n<p>Which of the following best describes the conditions under which mobile devices and applications can track your location?<br>(MOBILE DEVICES)<\/p>\n\n\n\n<p>It may occur at any time without your knowledge or consent.<\/p>\n\n\n\n<p>Which of the following is an example of removable media?<br>(MOBILE DEVICES)<\/p>\n\n\n\n<p>External hard drive.<\/p>\n\n\n\n<p>Which of the following is true of Internet of Things (IoT) devices?<\/p>\n\n\n\n<p>They can become an attack vector to other devices on your home network.<\/p>\n\n\n\n<p>When is it appropriate to have your security badge visible?<\/p>\n\n\n\n<p>At all times when in the facility.<\/p>\n\n\n\n<p>What should the owner of this printed SCI do differently?<\/p>\n\n\n\n<p>Retrieve classified documents promptly from printers.<\/p>\n\n\n\n<p>What should the participants in this conversation involving SCI do differently?<\/p>\n\n\n\n<p>Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed.<\/p>\n\n\n\n<p>Which of the following demonstrates proper protection of mobile devices?<\/p>\n\n\n\n<p>Linda encrypts all of the sensitive data on her government-issued mobile devices.<\/p>\n\n\n\n<p>Which of the following does NOT constitute spillage?<br>(SPILLAGE)<\/p>\n\n\n\n<p>Classified information that should be unclassified and is downgraded.<\/p>\n\n\n\n<p>Which of the following is NOT an appropriate way to protect against inadvertent spillage?<br>(SPILLAGE)<\/p>\n\n\n\n<p>Use the classified network for all work, including unclassified work.<\/p>\n\n\n\n<p>Which of the following may help to prevent spillage?<br>(SPILLAGE)<\/p>\n\n\n\n<p>Follow procedures for transferring data to and from outside agency and non-government networks.<\/p>\n\n\n\n<p>Which of the following should you NOT do if you find classified information on the internet?<\/p>\n\n\n\n<p>Download the information.<\/p>\n\n\n\n<p>Who designates whether information is classified and its classification level?<\/p>\n\n\n\n<p>\u2026<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A vendor conducting a pilot program with your organization contacts you for organizational data to use in a prototype. How should you respond?Refer the vendor to the appropriate personnel. When classified data is not in use, how can you protect it?Store classified data appropriately in a GSA-approved vault\/container. What is the basis for handling and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[25],"tags":[],"class_list":["post-117181","post","type-post","status-publish","format-standard","hentry","category-exams-certification"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/117181","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=117181"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/117181\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=117181"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=117181"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=117181"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}