Remove your security badge after leaving your controlled area or office building. c. Nothing. Your favorite movie. relates to reporting of gross mismanagement and/or abuse of authority. The popup asks if you want to run an application. Further guidance included in "What DASA does not fund" section. *Spillage What is a proper response if spillage occurs? ( Which of the following is a good practice to prevent spillage. 1.4.6. What is the unit product cost for Job 413? Removable Media in a SCIF (Evidence): What portable electronic devices (PEDs) are permitted in a SCIF? GU,}+ You must have your organization's permission to telework. Use the classified network for all work, including unclassified work. Store your Common Access Card (CAC) or Personal Identity Verification (PIV) card in a shielded sleeve ~Write your password down on a device that only you access (e.g., your smartphone) Change your password at least every 3 months Enable two-factor authentication whenever available, even for personal accounts. A man you do not know is trying to look at your Government-issued phone and has asked to use it. **Social Engineering Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? What security risk does a public Wi-Fi connection pose? (Permitted Uses of Government-Furnished Equipment GFE)) Viewing or downloading pornography - No Gambling online - No Conducting a private money-making venture - No Using unauthorized software - No Illegally downloading copyrighted material - No Making unauthorized configuration changes - No Incident What is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Ask the individual to see an identification badge. HTMk0(XlB[[CxBIQv
,h{K{:2I!ILaTh}|?~54C&F. What is a security best practice to employ on your home computer? UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. What action should you take with a compressed Uniform Resource Locator (URL) on a website known to you? The last payment, entitled satisfactory completion of all work under the contract, shall be at least 20% of the total quoted firm price. After you have returned home following the vacation. Please note that this process will take as long as necessary and could take up to 6 weeks in some cases for non-UK nationals. What information relates to the physical or mental health of an individual? **Insider Threat How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? . Spear Phishing attacks commonly attempt to impersonate email from trusted entities. There are many travel tips for mobile computing. hVo0W*$E*TG-%V$
%d|#I 1!=#"b$!'1Xr$8vG}z|C/B How many potential insiders threat indicators does this employee display? Scan external files from only unverifiable sources before uploading to computer. be wary of suspicious e-mails that use your name and/or appear to come from inside your organization. A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. Which of the following is true about URLs? You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. Sensitive Compartmented Information (Incident #2): What should the owner of this printed SCI do differently? When classified data is not in use, how can you protect it? Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. What are some potential insider threat indicators? **Identity Management Which of the following is the nest description of two-factor authentication? Which of the following is a good practice to protect classified information? endstream
endobj
1069 0 obj
<>/Metadata 18 0 R/Pages 1066 0 R/StructTreeRoot 22 0 R/Type/Catalog/ViewerPreferences 1083 0 R>>
endobj
1070 0 obj
<>/MediaBox[0 0 842.04 595.32]/Parent 1066 0 R/Resources<>/Font<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI]>>/Rotate 0/StructParents 0/Tabs/S/Type/Page>>
endobj
1071 0 obj
<>stream
Her badge is not visible to you. 2 0 obj
Which of the following is true of using DoD Public key Infrastructure (PKI) token? **Social Networking Which of the following is a security best practice when using social networking sites? What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? Which of the following is an example of removable media? 3 0 obj
a. CUI may be stored on any password-protected system. Which of these is true of unclassified data? Ask for information about the website, including the URL. **Insider Threat Which type of behavior should you report as a potential insider threat? a. When is it appropriate to have your security badge visible? not correct Software that installs itself without the users knowledge, Malicious Code (Damage): How can malicious code cause damage? **Social Engineering Which may be a security issue with compressed Uniform Resource Locators (URLs)? **Use of GFE When can you check personal e-mail on your Government-furnished equipment (GFE)? Avoid talking about work outside of the workplace or with people without a need-to-know. A headset with a microphone through a Universal Serial Bus (USB) port. How Do I Answer The CISSP Exam Questions? $l*#p^B{HA<>C^9OdND_ `
Unclassified information cleared for public release. You should confirm that a site that wants to store a cookie uses an encrypted link. endstream
endobj
startxref
Only documents that are classified Secret, Top Secret, or SCI require marking. These are tangible items that the Contractor must manage and account for. You must provide details to us of any related public announcement for review prior to release. only connect government-owned PEDs to the same level classification information system when authorized. Porton Down They broadly describe the overall classification of a program or system. The website requires a credit card for registration. b. Software that installs itself without the users knowledge. (Malicious Code) Which of the following is true of Internet hoaxes? A coworker has asked if you want to download a programmers game to play at work. Which of the following must you do before using an unclassified laptop and peripherals in a collateral classified environment? He has the appropriate clearance and a signed, approved, non-disclosure agreement. How many insider threat indicators does Alex demonstrate? What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? Don't assume open storage in a secure facility is authorized. Classified material must be appropriately marked. What information sources do you think students on your campus use when acquiring dress clothes? Proactively identify potential threats and formulate holistic mitigation responses. When using a public device with a card reader, only use your DoD CAC to access unclassified information, is only allowed if the organization permits it. The following table summarizes the rules of debit and credit. Decline to let the person in and redirect her to security. hbbd``b`
$gE@eHLD tk%bUHT 9L,,F|` &1/
Classification markings and handling caveats. **Social Networking Which of the following statements is true? not correct. Access to and use of the information of this website is at the user's risk. Paul verifies that the information is CUI, includes a CUI marking in the subject header and digitally signs an e-mail containing CUI. Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approves for access to the NIPRNET. (Answer) CPCON 2 (High: Critical and Essential Functions) CPCON 1 (Very High: Critical Functions) CPCON 3 (Medium: Critical, Essential, and Support Functions) CPCON 4 (Low: All Functions) CPCON 5 (Very Low: All Functions). Then select Submit. The contractors inability or unwillingness to supply its own resources is not a sufficient reason for the furnishing or acquisition of property. Insider threat: (Marks statement): What should Alexs colleagues do? b. When submitting your proposal, you must provide a resourcing plan that identifies, where possible, the nationalities of those proposed research workers that you intend working on this phase. Which of the following is not Controlled Unclassified Information (CUI)? Proprietary data b. Government Furnished Assets (GFA) could be equipment, information or resources that are government-owned and loaned (on a free-of-charge basis) to a contractor to . a. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. b) Upward sloping; vary negatively with the price level Family and relationships - Friends Only In which situation below are you permitted to use your PKI token?A. Which of the following is a good practice to protest classified information? The long-run aggregate supply curve (LRAS) curve is ______ with a real output level that _____, a) Upward sloping; varies positively with the price level (social networking) When is the safest time to post details of your vacation activities on your social networking profile? **Insider Threat Which of the following should be reported as a potential security incident? **Home Computer Security How can you protect your information when using wireless technology? Would you like to enable the firewall? **Identity Management Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. Which of the following is true of downloading apps? You know this project is classified. In competitions using the ISC and DEFCON 705 you must also state in your proposal if the deliverables are what we call Full Rights or Limited Rights versions. What is the best example of Protected Health Information (PHI)? Which of the following is not a best practice to preserve the authenticity of your identity? Store classified data in a locked desk drawer when not in use Maybe a. economics. Beware of sudden flashing pop-ups that warn your computer is infected with a virus. Correct. What can help to protect the data on your personal mobile device. **Social Networking When is the safest time to post details of your vacation activities on your social networking website? CUI may be stored only on authorized systems or approved devices. Unclassified documents do not need to be marked as a SCIF. Where you specify in your proposal Limited Rights versions of deliverables, you must also specify whether the relevant Background Information has been previously generated under contract using MOD funding. Which of the following is true of downloading apps? a. Linda encrypts all of the sensitive data on her government-issued mobile devices. Never print classified documents b. Label the printout UNCLASSIFIED to avoid drawing attention to it c. Retrieve classified documents promptly from printers. - Updated ISC Schedule, Innovation Standard Contract Limit of Liability change - new version attached. You find information that you know to be classified on the Internet. How are Trojan horses, worms, and malicious scripts spread? As long as the document is cleared for public release, you may release it outside of DoD. Nothing. Darryl is managing a project that requires access to classified information. *Spillage Which of the following may help to prevent spillage? Use of GFE (Incident): Permitted Uses of Government-Furnished Equipment (GFE) A No to all: Viewing or downloading pornography, gambling online, conducting a private money-making venture, using unauthorized software, Illegally downloading copyrighted material, making unauthorized configuration changes. Linda encrypts all of the sensitive data on her government-issued mobile devices. Which of the following does not constitute spillage. correct. Store it in a locked desk drawer after working hours. (Spillage) What is required for an individual to access classified data? Brainscape helps you realize your greatest personal and professional ambitions through strong habits and hyper-efficient studying. Correct. Which of the following is NOT a security best practice when saving cookies to a hard drive? Appropriate confidentiality agreements will be put in place. Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. They may be used to mask malicious intent. On a computer displaying a notification to update the antivirus softwareB. The site is available via registered access. Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. %PDF-1.7
%
It includes a threat of dire circumstances. You must have your organizations permission to telework. Of the following, which is NOT a characteristic of a phishing attempt? d. All of these. Compute The Average Kids Per Family. HHS published the HHS Memorandum: the Use of Government Furnished Equipment during Foreign Travel. Which of the following is NOT an example of CUI? 1304). Which of the following is NOT a type of malicious code? Storage devices (e.g., USB memory sticks, hard drives, etc.) **Classified Data Which of the following is true of protecting classified data? Submission Service reopen dates published. .gov Should you always label your removable media? Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only? NOT permitted uses of government-furnished equip (GFE) for: Viewing or downloading p*rn*graphy. - Updated Innovation Standard Contract (ISC) document and schedule, the ISC will be used for Themed and Open Call competitions. !vk\I* 2ziCB&9pFX[SdW'9$v
0P0 E 572 /P)FP#?:6A,$yB$jut42>]|5Q:|%C}F|::r=5GrI!y+fO)MJ)a*'os}OzAPTTHHfu *Sensitive Compartmented Information What should the participants in this conversation involving SCI do differently? Only use Government-furnished or Government-approved equipment to process CUI, including PII. All government-owned PEDs c. Only expressly authorized government-owned PEDs. (Identity Management) What certificates are contained on the Common Access Card (CAC)? Any information, products, services or hyperlinks contained within this website does not constitute any type of endorsement by the DoD, Air Force, Navy or Army. correct. Decline to let the person in and redirect her to security. How can you protect yourself from social engineering? Which of the following is an example of malicious code? What type of attack might this be? CPCON 4 (Low: All Functions) Government furnished property can be designated as either equipment or material. Under the PHE, the federal government implemented a range of modifications and waivers impacting Medicare, Medicaid and private insurance requirements, as well as numerous other programs, to provide relief to healthcare . Evidence What is a way to prevent the download of viruses and other malicious code when checking your e-mail? In addition to avoiding the temptation of greed to betray his country, what should Alex do differently? Which designation marks information that does not have potential to damage national security? CPCON 2 (High: Critical and Essential Functions) Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? Software that installs itself without the user's knowledge. endstream
endobj
1073 0 obj
<>stream
(Travel) Which of the following is a concern when using your Government-issued laptop in public? all non-redacted elements of the final terms and conditions, all non-redacted elements of the contract schedules. c. Both of these, Use of GFE (Incident): Permitted Uses of Government-Furnished Equipment (GFE). Is it okay to run it? (IRS-defined) Use of Government Furnished Equipment (GFE) phones and GFE MiFi's/Hot-Spots for remote access to IRS IT assets (e.g., networks, systems) shall be provided through an encryption mechanism such as a . When can you check personal email on your government furnished equipment? Find out about the Energy Bills Support Scheme, Armed forces and Ministry of Defence reform, Defence and Security Accelerator (DASA) Open Call for Innovation, Defence and Security Accelerator: ethical, legal and regulatory guidance, Technology concept and/or application formulated, Analytical and experimental critical function and/or characteristic proof of concept, Technology basic validation in a laboratory environment, Technology basic validation in a relevant environment, Technology model or prototype demonstration in a relevant environment, Technology prototype demonstration in an operational environment, Actual technology completed and qualified through test and demonstration, Actual technology qualified through successful mission operations, projects or manpower that is currently receiving funding or has already been funded from elsewhere in government, concepts which are not novel or innovative. Classified material must be appropriately marked. Where this is the case you should also state clearly in your proposal the details of the prior contract and the associated intellectual property contract conditions. ! (A type of phishing targeted at senior officials) Which is still your FAT A$$ MOTHER! What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure? c. This is never okay. Malicious code can mask itself as a harmless e-mail attachment, downloadable file, or website. Enable automatic screen locking after a period of inactivity. A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. correct. Telework is only authorized for unclassified and confidential information. *Malicious Code Which of the following is NOT a way that malicious code spreads? As part of the survey the caller asks for birth date and address. Which of the following should be done to keep your home computer secure? The interim payment plan must provide clearly defined work stages, deliverables with associated payments and timescales. Always check to make sure you are using the correct network for the level of data. You must provide us with a Full Rights Version of all deliverables, ensuring that it is coherent on its own. c) Vertical; are equal to the natural level of real output at all price levels 1068 0 obj
<>
endobj
For the specific purposes of considering additional funding for a competition and onward exploitation opportunities, DASA also reserves the right to share information in your proposal in-confidence with any UK Government Department. Report the suspicious behavior in accordance with their organizations insider threat policy. What should you do? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Use your legitimate antivirus software to perform a virus scan instead. When is the best time to post details of your vacation activities on your social networking website? This directive provides FSIS Federal and non-Federal employees (e.g., contractors) with instructions regarding the acceptable and unacceptable use of FSIS government-furnished equipment (GFE) (e.g., telecommunications resources, computers, laptops, and smartphones) and Government-issued e-mail addresses when conducting government business both General Services Administration (GSA) approval. When teleworking, you should always use authorized and software. (Spillage) What should you do when you are working on an unclassified system and receive an email with a classified attachment? Use the classified network for all work, including unclassified work. c
(Sensitive Information) Which of the following is NOT an example of sensitive information? For Government-owned devices, use approved and authorized applications only. **Classified Data How should you protect a printed classified document when it is not in use? Name and profile picture - Any **Classified Data What is a good practice to protect classified information? Refer the reporter to your organizations public affairs office. The DoD requires use of two-factor authentication for access. What threat do insiders with authorized access to information or information systems pose? Government Furnished Equipment (GFE) (FAR Part 45) is equipment that is owned by the government and delivered to or made available to a contractor. *Spillage Which of the following may help prevent inadvertent spillage? Retrieve classified documents promptly from printers. Based on the description that follows, how many potential insider threat indicators(s) are displayed? Which scenario might indicate a reportable insider threat? Contact the IRS using their publicly available, official contact information. In most cases there are no nationality restrictions, however DASA individual competition documents will detail any necessary restrictions. Of the following, which is NOT an intelligence community mandate for passwords? (Mobile Devices) Which of the following statements is true? <>/Metadata 317 0 R/ViewerPreferences 318 0 R>>
After clicking on a link on a website, a box pops up and asks if you want to run an application. Which may be a security issue with compressed urls? IncreasDecreaseNormalBalanceBalancesheetaccounts:AssetDebitLiabilityDebitStockholdersEquity:CapitalStockCreditRetainedEarningsCreditDividendsCreditCreditIncomestatementaccounts:RevenueCreditExpense(l)CreditDebit\begin{array}{lcc} Nothing. Store it in a General Services Administration (GSA)-approved vault or container. It wont be used for other purposes, without us having obtained the necessary rights and permissions to do so. Social Security Number, date and place of birth, mothers maiden name. a. Heres how you know. You many only transmit SCI via certified mail. When using a fax machine to send sensitive information, the sender should do which of the following? An investment in knowledge pays the best interest.. *Controlled Unclassified Information Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? remain prohibited. Insider threat: (Alexs statement) In addition to avoiding the temptation of greed to betray his country, what should Alex do differently? Confirm the individual's need-to-know and access. You must have your organizations permission to telework. We wont pre-fund any expenditure, so interim payment claims mustnt include costs not yet incurred. If classified information were released, which classification level would result in Exceptionally grave damage to national security? ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. On a NIPRNet system while using it for a PKI-required taskC. How can you protect yourself from social engineering? The Government relies on and requires its contractors to provide effective and efficient stewardship of the . More information on DEFCON 705 can be found here. a. Label all files, removable media, and subject headers with appropriate classification markings. 1101 0 obj
<>stream
Secure personal mobile devices to the same level as Government-issued systems. Right-click the link and select the option to preview??? (GFE) When can you check personal e-mail on your Government-furnished equipment (GFE)? Which of the following is NOT one? They can become an attack vector to other devices on your home network. Security updates are ready to install. Digitally signed e-mails are more secure. The determination of GFE is usually made by the government Program Manager (PM) and Contracting Officer. This bag contains your government-issued laptop. The guidance below will help you to understand who can apply for funding, the sort of projects the Defence and Security Accelerator (DASA) funds, and the terms and conditions of DASA contracts. A coworker removes sensitive information without authorization. Which of the following represents an ethical use of your Government-furnished equipment (GFE)? the whistleblower protection enhancement act relates to reporting. Ensure that any cameras, microphones, and Wi-Fi embedded in the laptop are physically disabled.- Correct. Correct. Neither confirm or deny the information is classified. Which of the following is true of protecting classified data? Your antivirus is out-of-date. Correct. Be aware of classification markings and all handling caveats. Retrieve classified documents promptly from printers. How can you protect yourself on social networking sites? A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. shall not modify, cannibalize, or make alterations to U.S. Forest Service property. If you are concerned your project falls in to one of these categories and are unsure if you should submit a full proposal for a competition please submit a Contact DASA Form which will be checked by a member of our team. They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. Which of the following is true of Protected Health Information (PHI)? Always use DoD PKI tokens within their designated classification level. English is the official language for all communication between bidders, DASA and in all parts of DASA proposals. The challenges goal is simple: To change user behavior to reduce the risks and vulnerabilities DoD Information Systems face. What action should you take? b. The email states your account has been compromised and you are invited to click on the link in order to reset your password. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Three or more. (Insider Threat) Based on the description that follows, how many potential insider threat indicator(s) are displayed?
Which of the following makes Alexs personal information vulnerable to attacks by identity thieves? Who is responsible for information/data security? Follow procedures for transferring data to and from outside agency and non-Government networks. CUI may be stored on any password-protected system. Then select Submit. not correct. Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI. \text{Capital Stock}&\text{Credit}&&\\ Which of the following actions can help to protect your identity? The email has an attachment whose name contains the word secret. Nonstandard Government property contract clauses (reference 41 U.S.C. Unclassified documents do not need to be marked as a SCIF. Do not access website links in e-mail messages. Throughout the life of any contract you must notify us in writing if you intend to change or add additional research workers. Serious damage c. Exceptionally grave damage. A personally owned device approved under Bring Your Own Approved Device (BYOAD) policy must be unenrolled while out of the country. Use personally-owned wired headsets and microphones only in designated areas, New interest in learning a foreign language. Information improperly moved from a higher protection level to a lower protection level.
Ottolenghi Prawn Orzo Calories,
How Many Kpop Fans Are There In The World,
Articles P