permitted uses of government furnished equipment

Which of the following may help to prevent inadvertent spillage? means youve safely connected to the .gov website. Controlled Unclassified Information (CUI). Select the information on the data sheet that is protected health information (PHI). Correct. (Insider Threat) A colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. Incident Laptop (Take CAC out), PIN note (Never write your PIN. In addition to offering an overview of cybersecurity best practices, the challenge also provides awareness of potential and common cyber threats. Remove your security badge after leaving your controlled area or office building. Your password and a code you receive via text message. What type of social engineering targets particular individuals, groups of people, or organizations? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Store it in a General Services Administration (GSA)-approved vault or container. Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. Ensure that any cameras, microphones, and Wi-Fi embedded in the laptop are physically disabled.- Correct. An investment in knowledge pays the best interest.. Classified information that should be unclassified and is downgraded. CUI must be handled using safeguarding or dissemination controls. Monitor credit card statements for unauthorized purchases, Thumb drives, memory sticks, and flash drives are examples of. endobj You can decide how often to receive updates. We expect our suppliers to maintain the highest standards of integrity and professionalism in their business dealings and adhere to the laws of the countries where they operate. Which of the following is true of downloading apps? **Social Networking Which of the following statements is true? The DoD requires use of two-factor authentication for access. c. Both of these, Use of GFE (Incident): Permitted Uses of Government-Furnished Equipment (GFE). CUI may be stored on any password-protected system. CUI must be handled using safeguarding or dissemination controls. Individuals must avoid referencing derivatively classified reports classified higher than the recipient.??? Refer the vendor to the appropriate personnel. It is releasable to the public without clearance. Ask for information about the website, including the URL. Mobile Devices (Incident): Which of the following demonstrates proper protection of mobile devices? Being cognizant of classification markings and labeling practices are good strategies to avoid inadvertent spillage. A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. all non-redacted elements of your proposal where these are incorporated into the final contract schedules or the terms and conditions. spillage definition cyber awareness. Government Furnished Equipment (GFE) is the generic term for materiel loaned to a contractor. correct. **Insider Threat A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Select all security issues. How are Trojan horses, worms, and malicious scripts spread? Which of the following is not a best practice to preserve the authenticity of your identity? Use only your personal contact information when establishing your account. HTMk0(XlB[[CxBIQv ,h{K{:2I!ILaTh}|?~54C&F. correct. <> **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? Each Form 388 must be signed and returned with a brief curriculum vitae (CV) of each person by the nominated individual completing the work. Enable automatic screen locking after a period of inactivity. Research the source to evaluate its credibility and reliability. When using mobile computing devices, including laptops and cell phones, in public: Be careful of information visible on your mobile computing device; consider screen protection Maintain possession of laptop and other government-furnished equipment (GFE) at all times and be extra vigilant in protecting it Protect your mobile computing device \text{Asset}&&&\text{Debit}\\ b. If you are concerned your project falls in to one of these categories and are unsure if you should submit a full proposal for a competition please submit a Contact DASA Form which will be checked by a member of our team. You receive an email from a company you have an account with. Damage b. Victim It is fair to assume that everyone in the SCIF is properly cleared. Disclaimer: AcqNotes is not an official Department of Defense (DoD), Air Force, Navy, or Army website. What is the best course of action? Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only? Select the information on the data sheet that is personally identifiable information (PII) but not protected health information (PHI). Aggregating it does not affect its sensitivyty level. \text{Income statement accounts:}&&&\\ Correct. what should be your response be? CUI may be stored on any password-protected system. What level of damage to national security can you reasonably expect Top secret information to cause if disclosed? Select all sections of the profile that contain an issue. How many potential insiders threat indicators does this employee display? c. Classified information that is intentionally moved to a lower protection level without authorization. They may be used to mask malicious intent. Appropriate confidentiality agreements will be put in place. When is it okay to charge a personal mobile device using government-furnished equipment (GFE)? What should the participants in this conversation involving SCI do differently? Storage devices (e.g., USB memory sticks, hard drives, etc.) Then select Save. **Classified Data Which of the following is true of telework? Do not access website links in e-mail messages. **Identity Management Which of the following is the nest description of two-factor authentication? Which of the following is NOT a requirement for telework? In most cases there are no nationality restrictions, however DASA individual competition documents will detail any necessary restrictions. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. not correct. Should you always label your removable media? Adversaries exploit social networking sites to disseminate fake news. A Common Access Card and Personal Identification Number. endstream endobj 1072 0 obj <>stream Which of the following is NOT an example of sensitive information? Which of the following is an example of Protected Health Information (PHI)? \text{Balance sheet accounts:}\\ (Sensitive Information) Which of the following is NOT an example of sensitive information? What action should you take with a compressed Uniform Resource Locator (URL) on a website known to you? ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. What should you do? Which of the following is NOT considered sensitive information? Spillage: Which of the following is a good practice to prevent spillage? An experiment consists of tossing three fair (not weighted) coins, except that one of the three coins has a head on both sides. Photos and videos you are in - Friends Only, Controlled Unclassified Information: (Incident) Which of the following is NOT an example of CUI? As long as the document is cleared for public release, you may release it outside of DoD. Then select Submit. Spillage can be either inadvertent or intentional. It should only be in a system while actively using it for a PKI-required task. what should you do? On Jan. 30, 2023, President Joe Biden announced that the COVID-19 public health emergency (PHE) will end May 11, 2023. It is your responsibility as an employee to protect and conserve Government-owned or -leased property and vehicles and to use them only for authorized purposes. Do not forward, read further, or manipulate the file; Do not give out computer or network information, Do not follow instructions from unverified personnel. **Social Engineering What is TRUE of a phishing attack? Which is NOT a way to protect removable media? d. All of these. **Removable Media in a SCIF What must users ensure when using removable media such as compact disk (CD)? Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? At all times when in the facility c. At any time during the workday, including when leaving the facility. This must include the overall price, but not a breakdown of the pricing structure if that detailed information can be redacted under the Freedom of Information Act. Call your security point of contact immediately. Correct. Using unauthorized software. Position your monitor so that it is not facing others or easily observed by others when in use Correct. Insider threat: (Alexs statement) In addition to avoiding the temptation of greed to betray his country, what should Alex do differently? Family and relationships - Friends Only Serious damage c. Exceptionally grave damage. SP4 0JQ, Urgent DASA enquiries - Telephone +44 (0)1980 950000 option 3 (open 09:00am 12:00pm Monday-Friday), In the section 'What DASA does not fund' the 'Innovation Outline' has been replaced with the 'Contact DASA Form'. Malicious code can mask itself as a harmless e-mail attachment, downloadable file, or website. \text{Revenue}&&&\text{Credit}\\ Which of the following is not considered a potential insider threat indicator? (Malicious Code) Which of the following is true of Internet hoaxes? Spillage because classified data was moved to a lower classification level system without authorization. Which of the following is true of internet hoaxes? Classification markings and handling caveats. Which of the following is true about telework? Never use personal e-mail accounts for transmitting PII. x[s~8Rr^/CZl6U)%q3~@v:=dM \text{Capital Stock}&\text{Credit}&&\\ John submits CUI to his organizations security office to transmit it on his behalf. th Xe>_ Mark SCI documents appropriately and use an approved SCI fax machine. Which of the following is an example of a strong password? Balancesheetaccounts:AssetLiabilityStockholdersEquity:CapitalStockRetainedEarningsDividendsIncomestatementaccounts:RevenueExpenseIncreasCreditCredit(l)DecreaseDebitCreditCreditNormalBalanceDebitCreditCreditDebit.

Nurse Salary At Cleveland Clinic, Steve Gaines Daughter, Articles P

permitted uses of government furnished equipment