Tulsa Oilers Baseball,
Articles P
You must possess security clearance eligibility to telework. How can you protect data on your mobile computing and portable electronic devices (PEDs)? Correct. b. Contractors are ordinarily required to furnish all property necessary to perform Government contracts. Where this is the case you should also state clearly in your proposal the details of the prior contract and the associated intellectual property contract conditions. Its classification level may rise when aggregated. Skip the coffee break and remain at his workstation. spillage definition cyber awareness. Always take your CAC when you leave your workstation. **Social Networking When is the safest time to post details of your vacation activities on your social networking profile? What is the total manufacturing cost assigned to Job 413? (Malicious Code) Which email attachments are generally SAFE to open? *Sensitive Information Which of the following is the best example of Personally Identifiable Information (PII)? Use the classified network for all work, including unclassified work. **Insider Threat What is an insider threat? Classified information that should be unclassified and is downgraded. The Town and Country Planning (Use Classes) Order 1987 ( as amended) puts uses of land and buildings into various categories known as 'Use Classes' which are detailed below. Which of the following is true of Controlled Unclassified Information (CUI)? Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? (Spillage) What should you do if a reporter asks you about potentially classified information on the web? Which is NOT a method of protecting classified data? A coworker is observed using a personal electronic device in an area where their use is prohibited. Dont assume open storage in a secure facility is authorized Maybe. 0, 1, 2, or 3+. They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. tell your colleague that it needs to be secured in a cabinet or container. **Social Engineering What is TRUE of a phishing attack? Which of the following is a good practice to prevent spillage. (Spillage) What should you do when you are working on an unclassified system and receive an email with a classified attachment? What action should you take? endobj
**Insider Threat Which scenario might indicate a reportable insider threat? On a computer displaying a notification to update the antivirus softwareB. *Sensitive Information Under which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group?