What should you do if you are contacted by a foreign national seeking information?

AS someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? inform your security POC of all bob-professional or non-routine contacts with foreign nationals….

What should you do if a reporter ask you about potentially classified information on the Web?

What should you do if a reporter asks you about potentially classified information on the web? Neither confirm nor deny the information is classified. Which of the following is NOT true concerning a computer labeled SECRET? May be used on an unclassified network.

What should you do when you are working on an unclassified system and receive an email with a classified attachment?

What should you do when you are working on an unclassified system and receive an email with a classified attachment? Call your security point of contact immediately.

ALSO READ:  At which tectonic setting would you most likely find volcanoes?

Under what circumstances is it permitted to share an unclassified document?

Is it permitted to share an unclassified draft document with a non-DoD professional discussion group? As long as the document is cleared for public release, you may share it outside of DoD. Within a secure area, you see an individual you do not know.

What is the proper response if spillage occurs?

What is a proper response if spillage occurs? Immediately notify your security POC. A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization.

Which is a rule for removable media?

What is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Do not use any personally owned/non-organizational removable media on your organization’s systems.

Which of the following is the best example of protected health information PHI?

Health information such as diagnoses, treatment information, medical test results, and prescription information are considered protected health information under HIPAA, as are national identification numbers and demographic information such as birth dates, gender, ethnicity, and contact and emergency contact …

When should a security badge be visible?

When is it appropriate to have your securing badge visible with a sensitive compartmented information facility? At all time when is the facility.

What must you ensure if your work involves?

What must you ensure if your work involves the use of different types of smart card security tokens? Avoid a potential security violation by using thr appropriate token for each system. … Don’t allow her access into secure areas and report suspicious activity.

What is the best description of two factor authentication cyber awareness challenge?

Two-factor authentication (2FA) is a security system that requires two separate, distinct forms of identification in order to access something. The first factor is a password and the second commonly includes a text with a code sent to your smartphone, or biometrics using your fingerprint, face, or retina.

ALSO READ:  Does Saturn have a weather pattern?

Under what circumstances is it acceptable to use your government furnished computer?

What is the best protection method for sharing personally identifiable information?

What is the best protection method for sharing Personally Identifiable Information (PII)? Digitally sign and encrypt the email.

Which email attachments are generally safe to open?

Email attachments that contain images, videos, and audio files are generally considered to be the safest to open. These include files with common extensions such as JPG, PNG, GIF, MOV, MP4, MPEG, MP3, and WAV.

Which is true for protecting classified data?

Which of the following is true of protecting classified data? Classified material must be appropriately marked. In addition to avoiding the temptation of greed to betray his country, what should Alex do differently?

When classified data is not in use How can you protect it?

When classified data is not in use, how can you protect it? Store classified data appropriately in a GSA-approved vault/container when not in use. Which is a good practice to protect classified information? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material.

Which of the following is best example of personally identifiable information?

Personally identifiable information, or PII, is any data that could potentially be used to identify a particular person. Examples include a full name, Social Security number, driver’s license number, bank account number, passport number, and email address.

Leave a Comment