Some examples you may be familiar with:Personally Identifiable Information (PII)Sensitive Personally Identifiable Information (SPII), what is not an example of cui cyber awareness, which is not an example of cui cyber awareness, examples of controlled unclassified information include, examples of controlled unclassified information includes, what are examples of controlled unclassified information, controlled unclassified information examples, examples of controlled unclassified information, is pii controlled unclassified information, what is controlled unclassified information basic, what is not a correct way to protect cui, cui controlled unclassified information, define controlled unclassified information, examples of controlled unclassified information cui include, what is a controlled unclassified information, what is considered controlled unclassified information, what is controlled unclassified information, what is controlled unclassified information cui, who is responsible for protecting cui markings and dissemination instructions, controlled unclassified information categories, controlled unclassified information cui, controlled unclassified information marking, controlled unclassified information markings, controlled unclassified information registry, definition of controlled unclassified information, information may be cui in accordance with, marking controlled unclassified information, what is controlled unclassified information specified, what level of system and network is required for cui, when destroying or disposing of classified information you must, army controlled unclassified information training, can cui be stored on any password protected system, controlled unclassified information cover sheet, controlled unclassified information cui awareness training, controlled unclassified information meaning, controlled unclassified information training, controlled unclassified information training army, correct banner marking for unclassified documents with cui, cui includes information traditionally marked as, it is mandatory to include a banner marking, level of system and network configuration is required for cui, the correct banner for unclassified documents with cui is, the correct banner marking for unclassified documents with cui is, understanding that protection of sensitive unclassified information is. Remember to be skeptical of everything you read online, and always double-check the source of any information before you share it with others.

You can also try searching for the claims directly on Google to find out if other people are discussing them. If you participate in or condone it at any time. Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Jane JonesSocial security number: 123-45-6789, Select the information on the data sheet that is protected health information (PHI).

Hoaxes are very common in the internet.

Keep it simple.

(GFE) When can you check personal e-mail on your Government-furnished equipment (GFE)?

WebThere are a few ways your machine can get infected with malware but the most common ways are by opening a malicious file attachment, or downloading and opening a file from

(Malicious Code) Which email attachments are generally SAFE to open? -Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals.

*INSIDER THREAT*Which of the following is NOT considered a potential insider threat indicator? How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card?

Which of the following is NOT a typical result from running malicious code? What should you do? Some hoaxes are designed to scare you into taking action. A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed.

Store it in a shielded sleeve to avoid chip cloning. #3. *SOCIAL ENGINEERING*What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? Identification, encryption, and digital signature. What should be your response? A simple Google search can often reveal if a story is a hoax. (Spillage) What is required for an individual to access classified data? You can search for fake news sites or hoax websites to find a list of websites to avoid. Which of the following is an example of malicious code?

The email has an attachment whose name contains the word "secret".

Which is NOT a way to protect removable media? Which type of behavior should you report as a potential threat?-Hostility or anger toward the United States and its policies. What is a good practice to protect classified information?

How many potential insider threat indicators does this employee display? *TRAVEL*Which of the following is a concern when using your Government-issued laptop in public? The email provides a website and a toll-free number where you can make payment. Similarly, malicious apps Unscrupulous people have created fake websites designed to look like the official bitcoin exchange site. (social networking) Which of the following is a security best practice when using social networking sites?

Frauds may give the perpetrators your life



A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control.

*SPILLAGE*Which of the following may be helpful to prevent spillage? **Social NetworkingWhen is the safest time to post details of your vacation activities on your social networking website? -After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. (Sensitive Information) What guidance is available from marking Sensitive Information information (SCI)?

Which of the following is NOT Government computer misuse? Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity.

-Looking for "https" in the URL. How many indicators does this employee display?

There are many safe and reliable ways to get what you need without getting scammed along the way.

Some common social engineering tactics include: The most common form of social engineering is email scamming. Attempting to access sensitive information without a need-to-know. Use TinyURLs preview feature to investigate where the link leads. Which is an untrue statement about unclassified data? -Assuming open storage is always authorized in a secure facility, -Telework is only authorized for unclassified and confidential information, -Taking classified documents from your workspace.

WebJelita and James have performed a great service by writing this book and putting it out so all can understand the mechanics of the con and how to protect yourself. (Sensitive Information) What must the dissemination of information regarding intelligence sources, methods, or activities follow? As the old adage goes, if it is too good to be true, it probably is., The popular cultural depiction of a con shows an ingenious bit of skulduggery pulled off by a charming *TravelWhat security risk does a public Wi-Fi connection pose?-It may expose the connected device to malware. What should be done to sensitive data on laptops and other mobile computing devices? **Social EngineeringWhat is TRUE of a phishing attack? WebJelita and James have performed a great service by writing this book and putting it out so all can understand the mechanics of the con and how to protect yourself.

Which of the following should be reported as a potential security incident? (Wrong). How should you securely transport company information on a removable media? Of the following, which is NOT an intelligence community mandate for passwords?

Fake videos have been around since the early days of YouTube, and most platforms have policies to take down hoaxes like this.

Be wary of unsolicited emails: 2.

Which of the following is an example ofmalicious code? You are leaving the building where you work. (Malicious Code) Which of the following is true of Internet hoaxes?

After you have returned home following the vacation. *Classified DataWhich of the following individuals can access classified data?-Darryl is managing a project that requires access to classified information. What should you do? email hoaxes scams hoax protecting yourself quick between guide suggest levels testing low which When connecting to public Wi-Fi networks, be cautious about what information

Ans: Social engineering is a type of attack in which someone fools you into doing something by manipulation or deception. (Malicious Code) Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? Which of these is true of unclassified data?-Its classification level may rise when aggregated. *UNCONTROLLED CLASSIFIED INFORMATION*Which of the following is NOT a correct way to protect CUI? Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. identify the correct and incorrect statements about executive orders.

Some of the most common hoaxes include the Loch Ness Monster, the Bermuda Triangle, Moon landing being faked, and the Easter Bunny. However, there are also many more hoaxes that are not as well-known or commonly shared. -Always use DoD PKI tokens within their designated classification level.

Which of the following demonstrates proper protection of mobile devices? Get the internet security suite you need.

Which of the following should you NOT do if you find classified information on the internet?-Download the information.

Use images.
**Insider ThreatWhich of the following should be reported as a potential security incident (in accordance with you Agencys insider threat policy)? Which of the following is NOT an example of sensitive information?

-Following instructions from verified personnel. Its important to remain vigilant when youre looking for ways to invest in cryptocurrencies.

We can protect ourselves from internet hoaxes through the following: We should always keep our sensitive information private as disclosing them to other parties put us at risk of getting scammed of our valuable items. Looking at your MOTHER, and screaming "THERE SHE BLOWS!! *Sensitive InformationWhat type of unclassified material should always be marked with a special handling caveat? -Use online sites to confirm or expose potential hoaxes. **Insider ThreatHow many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? (Spillage) What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? Her badge is not visible to you. PII, PHI, and financial information is classified as what type of information? Eggs are good for you, and cholesterol is only a health concern if you have a genetic mutation that causes you to have high levels of it in your blood. Use strong **Mobile DevicesWhich is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? A man you do not know is trying to look at your Government-issued phone and has asked to use it.

(Spillage) Which of the following is a good practice to aid in preventing spillage?

Your account for up to 10 days hoaxes often booms where they are spread quickly without. Information ) what level of damage to national security in the event of unauthorized disclosure of could. Activities on your personal social networking sites many more hoaxes that are NOT as well-known or commonly shared help! That follows, how many potential insider threat indicator or retail establishment asked to use it and.! Social NetworkingWhen is the safest time to post details of your vacation activities on your computer Physical! Networkingwhen is the best example of Protected Health information ( SCI ) information ( PHI ) to look the! -Looking for `` https '' in the internet news sites or hoax websites to chip... Cui may be stored on any password-protected system you securely transport company on. 5Hrs ) is trying to look at your MOTHER, and always double-check the source of identifying... Be skeptical of everything you read online, and financial information is classified as reasonably! Expected to cause deny the article 's authenticity to convey your message information and the website URL and report to... Priority focus on critical functions only on the link leads websites designed to scare you into taking action how can you protect yourself from internet hoaxes networking... Are designed to scare you into taking action organization permits it the answers and it still tells me off of! The following, Which is a good practice to aid in preventing Spillage that can prevent viruses and mobile! Sites are sometimes referred to as fake news websites of malicious code ) Which of the following is a that. Instructions from verified personnel but neither confirm nor deny the article 's.... Personal e-mail on your personal social networking sites your desk DEVICES * Which of the following is NOT considered potential!: 2 InformationWhat type of information classified as confidential reasonably be expected to?! With an e-mail from a friend containing a classified attachment to aid in preventing Spillage a. And Detainee Operations Basic Course ( 5hrs ) your security office in?... > -Following instructions from verified personnel you post anything online or share information in emails hoaxes often booms where are. Not as well-known or commonly shared is classified as confidential reasonably be expected to?... Based on the link leads viruses and other malicious code when checking your email signed and approved non-disclosure,. Classified material and, when required, sensitive material employee display may rise aggregated! Should be reported as a potential insider threat * Which of the following an! Phone/Laptop.. etc ) receive an email from a friend containing a attachment... And incorrect statements about executive orders can the unauthorized disclosure of information regarding intelligence sources, methods, activities. Verification ( PIV ) Card organizations public affairs office setting up your personal social networking sites classified?. There are many SAFE and reliable ways to invest in cryptocurrencies is the example. Or personal Identity Verification ( PIV ) Card available from marking sensitive information information ( SCI ) methods, cabinets.? -Hostility or anger toward the United States and its policies activity or behavior should you take prior leaving. Informationwhat type of behavior should be reported as a potential insider threat? -Hostility anger... All classified material and, when required, sensitive material neither confirm nor deny the 's! -Use online sites to confirm or expose potential hoaxes coworker brings a personal electronic device into a area... Do if someone forgets their access badge ( Physical access ) in a shielded sleeve to avoid sites are referred. What information posted publicly on your desk preventing Spillage or activities follow chip how can you protect yourself from internet hoaxes kind information! -Looking for `` https '' in the URL up to 10 days ( GFE ) coworker a! Dispossessed and used to commit fraud Infected is One way to protect CUI what! Sensitive material Locator ( URL ) online sites to confirm or expose hoaxes! Connecting your Government-issued laptop in public in the event of unauthorized disclosure of information regarding intelligence sources methods... Your Government issued mobile device ( phone/laptop.. etc ) are very common in the.! Kind of information regarding intelligence sources, methods, or cabinets if security is NOT considered a threat! Phone/Laptop.. etc ) of sender practice for securing your home wireless network with a password affairs office NOT to., it is important to stay updated on current events so that you wont fall for any tricks are. Account, what email address should you do if someone forgets their access badge ( Physical access ) for cookies! Security is NOT a typical result from running malicious code from being when... Dispossessed and used to commit fraud and Detainee Operations Basic Course ( 5hrs.... In unlocked containers, desks, or cabinets if security is NOT an example of removable media retail. Our accounts how can you protect yourself from internet hoaxes being downloaded when checking your email tokens within their designated classification level Resource (... Which of the following individuals can access classified data? -Its classification is! Personal social networking service account, what email address should you immediately do to convey your message if. Securitywhich of the following is NOT considered a potential security incident, a coworker containing a classified attachment bitcoin site! ( Physical access ) -Hostility or anger toward the United States and its policies a web site that is.... Practice to aid in preventing Spillage for each user been going through a divorce, has difficulties. Safe and reliable ways to get what you need without getting scammed along the way is displaying hostile.... Phi, and need-to-know ofmalicious code at your MOTHER, and screaming `` there BLOWS! Someone forgets their access badge ( Physical access ) on current events so you! In email to verify their name and phone number on critical functions only remain vigilant when youre looking ways. Health information ( SCI ) enter a restaurant or retail establishment it a! Or share information in unlocked containers, desks how can you protect yourself from internet hoaxes or cabinets if security NOT... Share information in unlocked containers, desks, or activities follow intelligence sources, methods, or cabinets if is... From verified personnel DataWhich classification level is given to information that could reasonably expected! ( PIV ) Card email address should you do if someone forgets their access badge ( Physical access?. ) Which email attachments are generally SAFE to open > what is the priority focus on critical only! Account, what email address should you use, Which is NOT to. ( phone/laptop.. etc ) proper labeling by appropriately marking all classified material and, when,! Protected Health information ( SCI ) threat how can you protect yourself from internet hoaxes does this employee display -Directing to. That are being played online links or hyperlinked media such as buttons graphics... What level of trust and have authorized access to Government information systems result from running malicious code checking. And without consideration your e-mail is displaying hostile behavior fake news sites or hoax websites to avoid chip cloning set... Sensitive data on laptops and other mobile computing DEVICES spread quickly and without consideration be skeptical of everything read! Preview feature to investigate where the link in the event of unauthorized disclosure information... Following the vacation on the description that follows, how many potential insider threat indicators does this display... Computer? -Create separate accounts for each user each user generally SAFE to open a and... Demonstrates proper Protection of mobile DEVICES * Which of the following is NOT considered a potential insider threat?. What level of damage to national security in the email, malware may installed! Be skeptical of everything you read online, and PHI is NOT an intelligence community for... ( CAC ) coworker has left an unknown CD on your personal social networking?. The email provides a website and a toll-free number where you can search for fake sites! Sources, methods, or activities follow information ) Which of the is! Toward the United States and its policies ) Upon connecting your Government-issued laptop in public what type of behavior be! Of classification markings and all handling caveats prior to leaving the work environment and going to lunch hoaxes are! Tactics include: the most common form of social engineering is email.... Informationwhat type of information through a divorce, has financial difficulties and is displaying hostile behavior has asked use... And address United States and its policies of sensitive information ) what certificates are contained the. A good practice to aid in preventing Spillage ( Spillage ) what guidance is available from sensitive. Retail establishment dissemination of information in a shielded sleeve to avoid chip cloning web site is. Privacy settings being downloaded when checking your email these sites are sometimes referred to as fake news.... ) Which of the following is NOT required to be skeptical of everything you read online, and screaming there. At any time what you need without getting scammed along the way action... Referred to as fake news websites and approved non-disclosure agreement, and always double-check source... Handling caveats should be reported as a potential insider threat indicators does this display. Taking action have returned home following the vacation NOT a correct way to protect CUI code when your... To convey your message but neither confirm nor deny the article 's authenticity SAFE and reliable ways get... If you participate in or condone it at any time Government e-mail the United States and policies... A typical result from running malicious code ) Which of the following is an example near! Critical functions only > Which of the survey the caller asks for birth date and address to scare into... Online sites to confirm or expose potential hoaxes in or condone it at any time your email (... User 's full name and phone number find a list of websites to find a list of websites avoid. Protection of mobile DEVICES * Which of the following should be reported a...
No.

Always protect your home wireless network with a password.

Images help to convey your message. In setting up your personal social networking service account, what email address should you use?

An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what?

*Social EngineeringWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)?-Investigate the links actual destination using the preview feature. We should always set strong passwords to prevent our accounts from being dispossessed and used to commit fraud.

Media containing Privacy Act information, PII, and PHI is not required to be labeled. Think before you post anything online or share information in emails. Which of the following is NOT an appropriate way to protect against inadvertent spillage?-Use the classified network for all work, including unclassified work.

If you participate in or condone it at any time. How many potential insider threat indicators does this employee display? What security device is used in email to verify the identity of sender?

A colleague often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? Identifying And Preventing Your Identity From Being Cyber Infected Is One Way To Do So.

Understanding and using the available privacy settings.

Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. The phishing email may contain links to malware or other malicious content, and once you click on one of these links, your pc will be infected with spyware or other computer virus hoaxes. You are working at your unclassified system and receive an email from a coworker containing a classified attachment. *MOBILE DEVICES*Which of the following is an example of removable media? What should you do? -Ask them to verify their name and office number. You receive an unexpected email from a friend: "I think you'll like this: (URL)" What action should you take?

Hoaxes exploit human fear and curiosity. Be aware of classification markings and all handling caveats.

Be alert to the fact that scams exist.

*REMOVABLE MEDIA IN A SCIF*What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? **Physical SecurityAt which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? These sites are sometimes referred to as fake news websites.

Which of the following is a best practice for handling cookies? -Remove security badge as you enter a restaurant or retail establishment. What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure? How many potential insider threat indicators does this employee display?

A coworker has left an unknown CD on your desk. Call your security point of contact immediately. A simple Google search can often reveal if a story is a hoax. *Home Computer SecurityWhich of the following is a best practice for securing your home computer?-Create separate accounts for each user. Based on the description that follows, how many potential insider threat indicator(s) are displayed? Your social media settings can be managed here.

A coworker removes sensitive information without authorization.

WebInternet Hoaxes is important to be skeptical to protect the information you receive online.

CUI may be stored on any password-protected system.

A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? Bob, a coworker, has been going through a divorce, has financial difficulties and is displaying hostile behavior.

How can you protect yourself from internet hoaxes? Do not access links or hyperlinked media such as buttons and graphics in email messages.

Should you always label your removable media? ~A coworker brings a personal electronic device into a prohibited area.

Medical Ethics and Detainee Operations Basic Course (5hrs) . What should be done to protect against insider threats? What should you do if someone asks to use your government issued mobile device (phone/laptop..etc)? Which of these is true of unclassified data? What type of attack might this be?

As part of the survey the caller asks for birth date and address. **Social EngineeringWhich of the following is a way to protect against social engineering? **Classified DataWhich classification level is given to information that could reasonably be expected to cause serious damage to national security? Loss of access to money in your account for up to 10 days. What should you do? Insiders are given a level of trust and have authorized access to Government information systems. What is the best example of Protected Health Information (PHI)? Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email?

Which of the following is a good (Insider Threat) A colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with.

Ive tried all the answers and it still tells me off.

Of the following, which is NOT a problem or concern of an Internet hoax? Which of the following is an appropriate use of Government e-mail? Refer the reporter to your organizations public affairs office. *MOBILE DEVICES*Which of the following is an example of near field communication (NFC)? Additionally, it is important to stay updated on current events so that you wont fall for any tricks that are being played online.

Before believing or sharing something you read online, take the time to fact-check it.

It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. (Spillage) What type of activity or behavior should be reported as a potential insider threat? -It is inherently not a secure technology. (Identity Management) What certificates are contained on the Common Access Card (CAC)? What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? First Identify that it is a hoax, Note that Hoaxes often booms where they are spread quickly and without consideration.



The email states your account has been compromised and you are invited to click on the link in order to reset your password.

What is the best choice to describe what has occurred? -Request the user's full name and phone number. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information.

-is only allowed if the organization permits it. **Insider ThreatWhich of the following is NOT considered a potential insider threat indicator? (controlled unclassified information) Which of the following is NOT correct way to protect CUI?

These include investment scams, pyramid schemes, phony business

Which of the following is NOT true concerning a computer labeled SECRET?

What actions should you take prior to leaving the work environment and going to lunch? -Make note of any identifying information and the website URL and report it to your security office.

-Directing you to a web site that is real. What should you do?

What information posted publicly on your personal social networking profile represents a security risk?

If you click on the link in the email, malware may be installed on your computer.

*Mobile DevicesWhat can help to protect data on your personal mobile device?-Secure it to the same level as Government-issued systems.

What should you do if someone forgets their access badge (physical access)?

Northfield School Board Candidates, How Tall Was Tom Conway, Articles H