Ensure there are no identifiable landmarks visible in any photos taken in a work setting that you post. a. It does not require markings or distribution controls. You know this project is classified. After clicking on a link on a website, a box pops up and asks if you want to run an application. What should you do if someone forgets their access badge (physical access)? c. Nothing. \text{Income statement accounts:}&&&\\ (Sensitive Information) What type of unclassified material should always be marked with a special handling caveat? What should you do if a reporter asks you about potentially classified information on the web? What should you do to protect yourself while on social networks? Did you earn a Cyber Security Awareness Challenge 2018 Certificate of Completion? a. Only use Government-furnished or Government-approved equipment to process PII. Top Secret information could be expected to cause exceptionally grave damage to national security of disclosed. A man you do not know is trying to look at your Government-issued phone and has asked to use it. NOT permitted uses of government-furnished equip (GFE) for: Viewing or downloading p*rn*graphy. (controlled unclassified information) Which of the following is NOT an example of CUI? Note the websites URL and report the situation to your security point of contact. Effective 01/01/2021. 10.8.27 Personal Use of Government Furnished Information Technology You find information that you know to be classified on the Internet. Your comments are due on Monday. Thats the only way we can improve. Describe the major components of the strategic management process. Which of the following personally-owned computer peripherals is permitted for use with Government-furnished equipment? Only paper documents that are in open storage need to be marked. Then select Submit. You have accepted additional cookies. A coworker brings a personal electronic device into prohibited areas. DOD Cyber Awareness 2021 Knowledge Check. Guidance on Defence and Security Accelerator terms and conditions for funding, contracts and intellectual property rights. Use personally-owned wired headsets and microphones only in designated areas, New interest in learning a foreign language. Which of the following is NOT a criterion used to grant an individual access to classified data? What action should you take? What should you do? *Controlled Unclassified Information Which of the following is NOT an example of CUI? Based on the description that follows, how many potential insider threat indicator(s) are displayed? the act of publicly documenting and sharing information is called. When is it appropriate to have your security badge visible? Do not use any personally owned/non-organizational removable media on your organizations systems. x[s~8Rr^/CZl6U)%q3~@v:=dM HTMO@[)4T@c4RIhj{v Which of the following is true of portable electronic devices (PEDs) in a Sensitive Compartmented Information Facility (SCIF)? Physical security of mobile phones carried overseas is not a major issue. It includes a threat of dire circumstances. Only connect with the Government VPN. Use Classes - Change of use - Planning Portal All https sites are legitimate and there is no risk to entering your personal info online. Which of the following is NOT a requirement for telework? Since the URL does not start with https, do not provide you credit card information. Ive tried all the answers and it still tells me off, part 2. Government Furnished Property Compliance Checklist Use your legitimate antivirus software to perform a virus scan instead. If aggregated, the classification of the information may not be changed. Before we can award a contract, we need each proposed research worker to complete a Form 388 that we will use to perform due diligence and obtain necessary clearances. Equipment which is Government-provided will be furnished and installed by the Government in space made available by the Contractor and with rough-in made by the Contractor in accord with the information made available or referenced herein or indicated. *Controlled Unclassified Information Which of the following is NOT a correct way to protect CUI? a. NOT permitted uses of government-furnished equip (GFE) - Getvoice.org Which of the following is true of Controlled Unclassified information (CUI)? When checking in at the airline counter for a business trip Decline so that you maintain physical contact of your Government-issued laptop. They broadly describe the overall classification of a program or system. They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. What is the total manufacturing cost assigned to Job 413? Which of the following individuals can access classified data? **Social Engineering Which of the following is a way to protect against social engineering? No. You receive an inquiry from a reporter about government information not cleared for public release. c. Remove his CAC and lock his workstation. Secure .gov websites use HTTPSA Which of the following actions is appropriate after finding classified Government information on the internet? The proper security clearance and indoctrination into the SCI program. GO1 Correct. 1.4.6. Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. Definition:Government Furnished Property (GFP) is the property in possession ofor acquired by the Government and subsequently furnished to the Contractor for the performance of a contract. What should be your response? *Sensitive Information Under what circumstances could classified information be considered a threat to national security? How can you protect data on your mobile computing and portable electronic devices (PEDs)? A Form 388 will be sent to you if youre successful under a DASA competition. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. Exposure to malware. What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF. What actions should you take with a compressed Uniform Resource Locator (URL) on a website known to you? Under the terms of DEFCON 705 any intellectual property generated under the contract belongs to the contractor. This is a spear phishing attempt, and it would be best to report it to security. Which of the following is NOT a typical means for spreading malicious code? All open opportunities are listed on the Apply for Funding page. Making unauthorized configuration changes - No. What is an indication that malicious code is running on your system? CUI may be stored only on authorized systems or approved devices. What is required for an individual to access classified data?

Saint Vincent High School Basketball Schedule, Articles P

permitted uses of government furnished equipment