permitted uses of government furnished equipment

0 urpnUTGD. Which of the following is NOT a correct way to protect sensitive information? Digitally signed e-mails are more secure. Controlled Unclassified Information: (Victim) Select the information on the data sheet that is protected health information (PHI). A personally owned device approved under Bring Your Own Approved Device (BYOAD) policy must be unenrolled while out of the country. (Malicious Code) Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? ( Which of the following is a security best practice when using social networking sites? Which of the following does NOT constitute spillage? Which of the following is NOT an example of Personally Identifiable Information (PII)? Only paper documents that are in open storage need to be marked. Never print classified documents b. Label the printout UNCLASSIFIED to avoid drawing attention to it c. Retrieve classified documents promptly from printers. Correct. correct. On a computer displaying a notification to update the antivirus softwareB. Correct. Which of the following represents an ethical use of your Government-furnished equipment (GFE)? <>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/MediaBox[ 0 0 612 792] /Contents 4 0 R/Group<>/Tabs/S/StructParents 0>> Which of the following demonstrates proper protection of mobile devices? There are many travel tips for mobile computing. endobj On Jan. 30, 2023, President Joe Biden announced that the COVID-19 public health emergency (PHE) will end May 11, 2023. Which of the following is true of removable media and portable electronic devices (PEDs)? Top Secret information could be expected to cause exceptionally grave damage to national security of disclosed. You are leaving the building where you work. What action should you take? t { They have similar features, and the same rules and protections apply to both. Access to and use of the information of this website is at the user's risk. laptops, fitness bands, tablets, smartphones, electric readers, and Bluetooth devices. GOVERNMENT-FURNISHED PROPERTY may only use U.S. Forest Service property furnished under this agreement for performing tasks assigned in this agreement. The person looked familiar, and anyone can forget their badge from time to time. Which of the following is true of Sensitive Compartmented Information (SCI)? Expires: 09/30/2023. Should you always label your removable media? When is it appropriate to have your security badge visible? correct. When is it okay to charge a personal mobile device using government-furnished equipment (GFE)? A total of 200 units were produced in Job 413. SP4 0JQ, Urgent DASA enquiries - Telephone +44 (0)1980 950000 option 3 (open 09:00am 12:00pm Monday-Friday), In the section 'What DASA does not fund' the 'Innovation Outline' has been replaced with the 'Contact DASA Form'. A coworker uses a personal electronic device in a secure area where their use is prohibited. They can become an attack vector to other devices on your home network. In setting up your personal social networking service account, what email address should you use? Turn on automatic downloading b. Sign up to get the latest information about your choice of CMS topics. 0-`*0r+u,1+~p]"WC0`=0uG!o8zGkv57?8/ssmZ]bw>V3^aiKPH(pUcWqR)u KmPy (TL2 DASA reserves the right to disclose on a confidential basis any information it receives from you during the procurement process to any third party engaged by DASA for the specific purpose of evaluating or assisting DASA in the evaluation of your proposal. (Malicious Code) What are some examples of malicious code? 4 0 obj Which of the following must you do before using an unclassified laptop and peripherals in a collateral classified environment? **Insider Threat Which of the following should be reported as a potential security incident (in accordance with you Agencys insider threat policy)? What does Personally Identifiable information (PII) include? Which of the following is NOT an appropriate way to protect against inadvertent spillage? To access this memo please visit: Government Furnished Equipment (GFE) (FAR Part 45) is equipment that is owned by the government and delivered to or made available to a contractor. Connect to the Government Virtual Private Network (VPN). Incident **Classified Data Which classification level is given to information that could reasonably be expected to cause serious damage to national security? **Social Networking Which of the following information is a security risk when posted publicly on your social networking profile? What is the basis for handling and storage of classified data? Verified answer. Follow instructions given only by verified personnel. Then select Save. Which of the following is NOT an appropriate way to protect against inadvertent spillage? Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)? Check in location via GPS: Off. 2) Difficult life circumstances, such as death of spouse. - Updated ISC Schedule, Innovation Standard Contract Limit of Liability change - new version attached. No, you should only allow mobile code to run from your organization or your organizations trusted sites. *Sensitive Information Under which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? We fund innovative and exploitable ideas that could lead to an advantage for UK armed forces and national security, and support UK prosperity. endstream endobj startxref Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? What information posted publicly on your personal social networking profile represents a security risk? **Social Engineering What is TRUE of a phishing attack? As a best practice, labeling all classified removable media and considering all unlabeled removable media as unclassified. What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? Sensitive Compartmented Information (Incident #2): What should the owner of this printed SCI do differently? Which of the following is true of internet hoaxes? NOT permitted uses of government-furnished equip (GFE) - Getvoice.org cyber-awareness email government organisation permission equipment 1 answer Under what circumstances is it acceptable to use your Government-furnished computer to check person e-mail asked in Internet by voice (263k points) internet internet-quiz cyber cyber-awareness government computer email personal policy 1 answer c. Report it to security. How many insider threat indicators does Alex demonstrate? A coworker removes sensitive information without approval. Attempting to access sensitive information without need-to-know, Avoid talking about work outside of the workplace or with people without a need-to-know, Report the suspicious behavior in accordance with their organizations insider threat policy. Exception. Use the classified network for all work, including unclassified work. Neither confirm or deny the information is classified. (Sensitive Compartmented Information) Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)? Share sensitive information only on official, secure websites. c. Analyze the other workstations in the SCIF for viruses or malicious code. c. Do not access website links in e-mail messages. Which of the following is NOT a good way to protect your identity? **Social Engineering How can you protect yourself from internet hoaxes? IncreasDecreaseNormalBalanceBalancesheetaccounts:AssetDebitLiabilityDebitStockholdersEquity:CapitalStockCreditRetainedEarningsCreditDividendsCreditCreditIncomestatementaccounts:RevenueCreditExpense(l)CreditDebit\begin{array}{lcc} What should the employee do differently? Government-owned PEDs when expressly authorized by your agency. You know that this project is classified. Verified answer. <>/Metadata 317 0 R/ViewerPreferences 318 0 R>> Refer the reporter to your organizations public affairs office. Which of the following actions is appropriate after finding classified Government information on the internet? MDM container - An application used to separate and secure NIH data and resources from the rest of the device. To: All Oregon/Washington Bureau of Land Management Employees. You receive an inquiry from a reporter about government information not cleared for public release. shall not modify, cannibalize, or make alterations to U.S. Forest Service property. Use the government email system so you can encrypt the information and open the email on your government issued laptop. What security device is used in email to verify the identity of sender? not correct. Which of the following statements is true? Birthday - Friends Only **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? Only use Government-furnished or Government-approved equipment to process PII. To help with this, prices in your proposal must be supported by a full cost breakdown. Official websites use .govA Remove your security badge after leaving your controlled area or office building. Alex demonstrates a lot of potential insider threat indicators. 0, 1, 2, or 3+. Government Furnished Equipment (GFE) - AcqNotes The Government relies on and requires its contractors to provide effective and efficient stewardship of the . The following table summarizes the rules of debit and credit. Which Of The Following Is Not A Correct Way To Protect CUI. Which of the following is NOT a potential consequence of using removable media unsafely in a Sensitive Compartmented Information Facility (SCIF)? What should you do? Individuals are prohibited from using government furnished equipment (e.g., copier, fax machine) to make more than a few copies of material (e.g., copying a book, making numerous copies of a resume, or sending/receiving a lengthy document via fax machines), as well as any use of such machines that conflicts with the actual need to use the government furnished equipment for official business . Spillage: Which of the following is NOT an appropriate way to protect against inadvertent spillage? Follow policy for using personally-owned computer peripherals with government furnished equipment (GFE): Permitted Monitors, with the following conditions: Connected via Visual Graphic Array (VGA), Digital Video Interface (DVI), High Definition Multimedia Interface (HDMI), or DisplayPort No other devices connected to the monitor Porton Down Government Furnished Resources (GFR) is personnel, most commonly Service Personnel on long-term loan or secondment. **Travel What is a best practice while traveling with mobile computing devices? Which of the following is a concern when using your Government-issued laptop in public? Which of the following represents an ethical use of your Government-furnished equipment (GFE)? How can you avoid downloading malicious code? DOD CYBER AWARENESS *UPDATED* Flashcards | Quizlet c. Allowing hackers access. Added link to Current Themed Competitions in the Our Standard Contracts section. relates to reporting of gross mismanagement and/or abuse of authority. What should you do? You have accepted additional cookies. Remove your security badge after leaving your controlled area or office building. Which of the following is NOT an example of sensitive information? Throughout the life of any contract you must notify us in writing if you intend to change or add additional research workers. Which of the following is a good practice to avoid email viruses? Photos of your pet Correct. *Malicious Code After visiting a website on your Government device, a popup appears on your screen. They may be used to mask malicious intent. ;A- fKpe'xfX@na=lzt Qh|(j@SYG}~1BY/6:{HqMvD` KNZ/)t\+b*"gO1s Classified data: (Scene) Which of the following is true about telework? Which of the following may help to prevent inadvertent spillage? *Sensitive Compartmented Information When is it appropriate to have your security badge visible? not correct. ideas from within Government (excluding Public Sector Research Establishments (PSREs). Which of the following is not a best practice to preserve the authenticity of your identity? Which of the following statements is true? DOD Cyber Awareness Challenge 2019- Knowledge Check *Spillage What should you do if you suspect spillage has occurred? (Sensitive Information) What guidance is available from marking Sensitive Information information (SCI)? Program Area: Property and Information Technology. Insiders are given a level of trust and have authorized access to Government information systems. Follow procedures for transferring data to and from outside agency and non-Government networks. Which of the following best describes the conditions under which mobile devices and applications can track your location? What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? cyber-awareness permission government equipment action answer Under what circumstances is it acceptable to use your Government-furnished computer to check person e-mail asked in Internet by voice (263k points) internet internet-quiz cyber cyber-awareness government computer email personal policy answer How can you protect yourself from social engineering? Report the crime to local law enforcement. where there would be significant financial or quality benefits to the work as a result of using GFA). Which of the following information is a security risk when posted publicly on your social networking profile? \end{array} You have rejected additional cookies. (Identity Management) Which of the following is an example of two-factor authentication? Is it permitted to share an unclassified draft document with a non-DoD professional discussion group? Of the following, which is NOT a problem or concern of an Internet hoax? Explain why. Which scenario might indicate a reportable insider threat? Ensure that the wireless security features are properly configured. a. It is releasable to the public without clearance. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Which of the following is NOT considered sensitive information? Who is responsible for information/data security? Storage devices (e.g., USB memory sticks, hard drives, etc.) Which of the following is NOT a DoD special requirement for tokens? The equipment can be Contractor-Furnished Equipment (CFE) or GFE. It is often the default but can be prevented by disabling the location function. **Social Networking When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? Which of the following is true of downloading apps? **Mobile Devices What should you do when going through an airport security checkpoint with a Government-issued mobile device? A trusted friend in your social network posts a link to vaccine information on a website unknown to you. Access requires Top Secret clearance and indoctrination into the SCI program. What certificates are contained on the Common Access Card (CAC)? a. As detailed in the ISC, you must mark your deliverables in accordance with the document marking scheme detailed therein. What is a best practice to protect data on your mobile computing device? You should submit your priced proposal using a staged approach, detailing deliverables and prices for work that can be done before and after getting ethical approval. Your favorite movie. Based on the description that follows how many potential insider threat indicators are displayed? What information most likely presents a security risk on your personal social networking profile? **Identity management Which of the following is an example of a strong password? elsieteel. (social networking) When may you be subjected to criminal, disciplinary, and/or administrative action due to online misconduct? (Malicious Code) What is a common indicator of a phishing attempt? Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)? Nothing. Further guidance included in "What DASA does not fund" section. CUI includes, but is not limited to Controlled Technical Information (CTI), Personally Identifiable Information (PII), Protected Health Information (PHI), financial information, personal or payroll information, proprietary data and operational information. As long as the document is cleared for public release, you may share it outside of DoD. Typically, a model is developed for analyzing both CFE and GFE when considering the use of GFE. Select all sections of the profile that contain an issue. Then select Submit. Home Computer Security (Evidence): Update Status: Install or Remind me later, Home Computer Security (Evidence): Firewall Status: Enable or Keep Disabled, Home Computer Security (Evidence): Virus Alert! Subject: Government Furnished Equipment for Telework and Remote Employees. If you participate in or condone it at any time. A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. **Social Networking As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? The email states your account has been compromised and you are invited to click on the link in order to reset your password. If you participate in or condone it at any time. (Sensitive Information) Which of the following is true about unclassified data? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. DASA will examine the legal status of organisations prior to placement of any contract. Ask probing questions of potential network contacts to ascertain their true identity c. Avoid talking about work outside of the workplace or with people without need-to-know. The site is available via registered access. Of the following, which is NOT a characteristic of a phishing attempt? When checking in at the airline counter for a business trip Decline so that you maintain physical contact of your Government-issued laptop. ) What should Sara do when publicly available Internet, such as hotel Wi-Fi? Only when badging in b. CPCON 1 (Very High: Critical Functions) What is the danger of using public Wi-Fi connections? PII includes, but is not limited to, social security numbers, date and places of birth, mothers maiden names, biometric records, and PHI. Position your monitor so that it is not facing others or easily observed by others when in use Correct. PDF DEPARTMENT OF DEFENSE - Cyber Which of the following must you do before using an unclassified laptop and peripherals in a collateral classified environment? Removable Media in a SCIF (Incident): What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF? What type of security is part of your responsibility and placed above all else?, If your wireless device is improperly configured someone could gain control of the device? Do not access website links, buttons, or graphics in e-mail. They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. Which of the following is an example of a strong password? A smartphone that transmits credit card payment information when held in proximity to a credit card reader. The guidance below will help you to understand who can apply for funding, the sort of projects the Defence and Security Accelerator (DASA) funds, and the terms and conditions of DASA contracts. Correct. Each interim payment must be related to verifiable achievement. *Sensitive Compartmented Information Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)? Individuals must avoid referencing derivatively classified reports classified higher than the recipient.??? (Sensitive Compartmented Information) What portable electronic devices (PEDs) are allow in a Secure Compartmented Information Facility (SCIF)? A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI________. Its classification level may rise when aggregated. It is getting late on Friday. [1]. Search for instructions on how to preview where the link actually leads. Break-even units equal 2,000. **Insider Threat What do insiders with authorized access to information or information systems pose? Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? *Spillage What should you do when you are working on an unclassified system and receive an email with a classified attachment? Avoid talking about work outside of the workplace or with people without need-to-know. Which piece of information is safest to include on your social media profile? hVo0W*$E*TG-%V$ %d|#I 1!=#"b$!'1Xr$8vG}z|C/B Who designates whether information is classified and its classification level? When is the best time to post details of your vacation activities on your social networking website? Retrieve classified documents promptly from printers. b. Added to "Our Standard Contracts" section: Themed Competitions have specific terms and conditions which you can find alongside the relevant competition document. (Insider Threat) Based on the description that follows, how many potential insider threat indicator(s) are displayed? If classified information were released, which classification level would result in Exceptionally grave damage to national security? *Social Networking (Malicious Code) What is a good practice to protect data on your home wireless systems? We expect our suppliers to maintain the highest standards of integrity and professionalism in their business dealings and adhere to the laws of the countries where they operate. Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIV) card.

Zabar's Catering Menu, Can You Wear A Copper Bracelet With A Pacemaker, Articles P

Tags: No tags

permitted uses of government furnished equipmentAjoutez un Commentaire