Which of the following actions is appropriate after finding classified information on the Internet quizlet?

Scheduled maintenance: Saturday, September 10 from 11PM to 12AM PDT

Home

Subjects

Solutions

Create

Log in

Sign up

Upgrade to remove ads

Only ₩37,125/year

  1. Social Science
  2. Sociology

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (28)

Which of the following actions is appropriate after finding classified Government information on the internet?

Note any identifying information and the website's URL

Which of the following may help to prevent inadvertent spillage?

Label all files, removable media, and subject headers with appropriate classification markings.

A colleague asks to leave a report containing protected health information (PHI) on his desk overnight so he can continue working on it the next day. How do you respond?

tell your colleague that it needs to be secured in a cabinet or container

Which of the following is NOT an example of sensitive information?

press release data

What does Personally Identifiable information (PII) include?

Social Security Number, date and place of birth, mother's maiden name

What is an indication that malicious code is running on your system?

file corruption

Which of the following is true of protecting classified data?

Classified material must be appropriately marked.

What is required for an individual to access classified data?

Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know.

Which of the following should be reported as a potential security incident?

A coworker removes sensitive information without authorization

What are some potential insider threat indicators?

difficult life circumstances such as substance abuse, divided loyalty or allegiance to the U.S., and extreme, persistent interpersonal difficulties

Which of the following is not considered a potential insider threat indicator?

treated mental health issues

When is the best time to post details of your vacation activities on your social networking website?

When your vacation is over, and you have returned home.

Which of the following is a best practice to protect information about you and your organization on social networking sites and applications?

Use only personal contact information when establishing personal social networking accounts, never use Government contact information.

You have reached the office door to exit your controlled area. As a security best practice, what should you do before exiting?

Remove your security badge, common access card (CAC), or personal identity verification (PIV) card.

What certificates are contained on the Common Access Card (CAC)?

Identification, encryption, and digital signature

How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card?

Store it in a shielded sleeve to avoid chip cloning.

Which is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF)

At all times when in the facility

What are the requirements to be granted access to sensitive compartmented information (SCI)?

The proper security clearance and indoctrination into the SCI program

Which is a risk associated with removable media?

Spillage of classified information.

While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. The website requires a credit card for registration. What should you do?

Since the URL does not start with "https," do not provide your credit card information.

What helps protect from spear phishing?

be wary of suspicious e-mails that use your name and/or appear to come from inside your organization.

What is a way to prevent the download of viruses and other malicious code when checking your e-mail?

View email in plain text and don't view email in Preview Pane.

Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email?

Do not access links or hyperlinked media such as buttons and graphics in email messages.

What is best practice while traveling with mobile computing devices?

Maintain possession of your laptop and other government-furnished equipment (GFE) at all times.

A Coworker has asked if you want to download a programmers game to play at work. what should be your response be?

I'll pass

What is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems?

Do not use any personally owned/non-organizational removable media on your organization's systems.

A man you do not know is trying to look at your Government-issued phone and has asked to use it. What should you do?

Decline to lend the man your phone.

What is a security best practice to employ on your home computer?

Create separate user accounts with strong individual passwords.

Sets found in the same folder

M-SLC ULO

71 terms

jer561

M-SLC FINAL

57 terms

jer561

Vital Skills for Authorizing Officials

10 terms

dgarcia_1103

The DTS Approval Process

11 terms

Elizabeth_Deeley

Other sets by this creator

Cyber Awareness Challenge Knowledge Check

28 terms

xoxokeekeexoxo

Board Study Pt. 5

80 terms

xoxokeekeexoxo

Board Study Pt. 4

46 terms

xoxokeekeexoxo

Table IV Commo Study Guide

62 terms

xoxokeekeexoxo

Verified questions

SOCIOLOGY

Television shows often mirror social changes. Sometimes, these changes have not yet reached the mainstream culture. What role do you think television has in changing society? Do you think its influence is more positive or negative?

Verified answer

SOCIOLOGY

People high in ______ are responsive to others' social and interpersonal cues. agreeableness self-efficacy self-esteem emotional intelligence external locus of control

Verified answer

SOCIOLOGY

Match the dimensions of stratification with the examples below. Use (W) for wealth, (Po) for power, and (Pr) for prestige. a. the respect accorded doctors b. a politician considering the interests of a political lobby c. the Nobel Peace Prize d. stock market holdings e. a Supreme Court ruling f. real estate assets.

Verified answer

SOCIOLOGY

Match terms a-e with the numbered example. a. cooperation b. conflict c. social exchange d. coercion e. conformity. Employees are forced to work overtime or be fired.

Verified answer

Other Quizlet sets

history 123456789122

50 terms

yahooandnuts

Concussions Final - past material

67 terms

Amira_Bedewi

LOFT Chapter 7

28 terms

faith_routley

Week 1 Lab Video

183 terms

cdwieser

Related questions

QUESTION

PQ: Why are people powerful according to pluralists?

3 answers

QUESTION

Riley v. California introduced a major change to the way that cell phone searches were handled after an arrest, and now:

4 answers

QUESTION

*How can the crisis of democracy be overcome, according to Georgina Waylen?

15 answers

QUESTION

Tech Company Response: Challenges of compliance with warrants due to encryption

5 answers

Which of the following actions is appropriate after finding classified info on the Internet?

Which of the following actions is appropriate after finding classified Government information on the internet? Note any identifying information and the website's URL.

What is the best response if you find classified data on the Internet?

What is the best response if you find classified government data on the internet? Note any identifying information, such as the website's URL, and report the situation to your security POC.

What should you do if a reporter asks you about potentially classified information on the Web?

What should you do if a reporter asks you about potentially classified information on the web? Refer the reporter to your organization's public affairs office.

Which of the following individuals can access classified data quizlet?

Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data.