tayside police road accidents today » permitted uses of government furnished equipment

permitted uses of government furnished equipment

  • por

&\textbf{Increas}&\textbf{Decrease}&\textbf{Normal Balance}\\ A coworker brings a personal electronic device into prohibited areas. Which of the following is NOT an example of Personally Identifiable Information (PII)? Use the classified network for all work, including unclassified work. Secure it to the same level as Government-issued systems. Attempting to access sensitive information without need-to-know. Its a condition of the contract that, as certain work must be justified ethically as well as scientifically, we reserve the right to terminate the work with immediate effect if you dont gain the relevant approval. Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. Be aware that it could take a period of time for the account to be activated. What should Sara do when using publicly available Internet, such as hotel Wi-Fi? a. A Common Access Card and Personal Identification Number. Storage devices (e.g., USB memory sticks, hard drives, etc.) The Governments official GFE policy is stated in Federal Acquisition Regulation (FAR) section 45.102 Policy which states: As part of its responsibility for acquisition planning (FAR Part 7, Acquisition Planning), the requiring activity (project or program manager or purchase request generator) decides whether or not to furnish property to Contractors. *Classified Data Individuals are prohibited from using government furnished equipment (e.g., copier, fax machine) to make more than a few copies of material (e.g., copying a book, making numerous copies of a resume, or sending/receiving a lengthy document via fax machines), as well as any use of such machines that conflicts with the actual need to use the government furnished equipment for official business . A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. Which of the following demonstrates proper protection of mobile devices? Do not access website links, buttons, or graphics in e-mail. Employees who require equipment as a reasonable accommodation must contact their reasonable accommodation coordinator in the Office of Human Resources Management or their supervisor for assistance. (Malicious Code) What are some examples of removable media? What should you do? It would be best to contact the institution using verified contact information to confirm. endstream endobj 1074 0 obj <>stream Not correct. (Sensitive Compartmented Information) What portable electronic devices (PEDs) are allow in a Secure Compartmented Information Facility (SCIF)? A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. Based on the description that follows, how many potential insider threat indicator(s) are displayed? Ensure there are no identifiable landmarks visible in any photos taken in a work setting that you post. Disclaimer: AcqNotes is not an official Department of Defense (DoD), Air Force, Navy, or Army website. Ctrl+F (Cmd+F) will help you a lot when searching through such a large set of questions. Incident Which of the following should be reported as a potential security incident (in accordance with your Agencys insider threat policy)? \text{Dividends}&\text{Credit}&\text{Credit}&\\ Note any identifying information and the websites Uniform Resource Locator (URL). When classified data is not in use, how can you protect it? Status, photos, and posts - Friends Only How can you protect data on your mobile computing and portable electronic devices (PEDs)? all non-redacted elements of the final terms and conditions, all non-redacted elements of the contract schedules. %%EOF Which of the following is NOT an example of CUI? Correct. After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. Install now? What action is recommended when somebody calls you to inquire about your work environment or specific account information? Select all security issues. Prevalence GFE consists of: b. You receive an email from a company you have an account with. The MOD commercial toolkit is accessible on the MOD internet site and contains details on MOD contract conditions. You must supply a completed Form 388 and CV for any new research workers. where there would be significant financial or quality benefits to the work as a result of using GFA). Ask probing questions of potential network contacts to ascertain their true identity c. Avoid talking about work outside of the workplace or with people without need-to-know. \text{Income statement accounts:}&&&\\ What type of security is part of your responsibility and placed above all else?, If your wireless device is improperly configured someone could gain control of the device? Incident Cyber Awareness Challenge Knowledge Check 2023 Answers, Cyber Awareness Challenge 2022 Knowledge Check Answers. Follow procedures for transferring data to and from outside agency and non-Government networks. CPCON 5 (Very Low: All Functions). \text{Retained Earnings}&&&\text{Credit}\\ Many apps and smart devices collect and share your personal information and contribute to your online identity. Which scenario might indicate a reportable insider threat? Use the classified network for all work, including unclassified work. correct. What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Do not access links or hyperlinked media such as buttons and graphics in email messages. The proper security clearance and indoctrination into the SCI program. **Website Use How should you respond to the theft of your identity? Where you specify in your proposal Limited Rights versions of deliverables, you must also specify whether the relevant Background Information has been previously generated under contract using MOD funding. - Updated Terms and conditions. b. Which of these is true of unclassified data? Who designates whether information is classified and its classification level? Its classification level may rise when aggregated. Her badge is not visible to you. Use the classified network for all work, including unclassified work. It includes a threat of dire circumstances. For Government-owned devices, use approved and authorized applications only. PII, PHI, and financial information is classified as what type of information? It may expose the connected device to malware. (social networking) When may you be subjected to criminal, disciplinary, and/or administrative action due to online misconduct? When operationally necessary, owned by your organization, and approved by the appropriate authority. Linda encrypts all of the sensitive data on her government issued mobile devices. The property provided to contractors for repair or overhaul is not subject to the requirements of the paragraph of bullet #2 above in this section. What does Personally Identifiable information (PII) include? Press release data. Classified data: (Theory) Which of the following is true of protecting classified data? **Social Networking Which of the following best describes the sources that contribute to your online identity? Best answer. What should the employee do differently? 4 0 obj Each interim payment must be related to verifiable achievement. <> While it may seem safer, you should NOT use a classified network for unclassified work. Then select Save. Photos and videos you are in - Friends Only, Controlled Unclassified Information: (Incident) Which of the following is NOT an example of CUI? Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. SSN, date and place of birth, mothers maiden name, biometric records, PHI, passport number, Subset of PII, health information that identifies the individual, relates to physical or mental health of an individual, provision of health care to an individual, or payment of healthcare for individual. You know this project is classified. Which of the following is NOT a good way to protect your identity? A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI________. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. Digitally signed e-mails are more secure. **Mobile Devices What can help to protect the data on your personal mobile device? Attachments contained in a digitally signed email from someone known. How should you respond? New interest in learning another language, Which of the following is a good practice to protect classified information. % ~A coworker brings a personal electronic device into a prohibited area. Which method would be the BEST way to send this information? Only use Government-furnished or Government-approved equipment to process PII. No federal endorsement of sponsors intended. Serious damage c. Exceptionally grave damage. Firewall disabled. Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? requirements to access classified information. 1082 0 obj <>/Filter/FlateDecode/ID[<6D11769074A68B4F9710B6CBF53B0C2B>]/Index[1068 34]/Info 1067 0 R/Length 76/Prev 82724/Root 1069 0 R/Size 1102/Type/XRef/W[1 2 1]>>stream Wed like to set additional cookies to understand how you use GOV.UK, remember your settings and improve government services. Understanding and using the available privacy settings. **Social Engineering What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? We reserve the right to add additional contractual conditions if individual circumstances dictate. This may be a malicious code attack. Which of the following information is a security risk when posted publicly on your social networking profile? Government Furnished Equipment: GFE refers to tooling or equipment thats provided to a contractor for use during the project . Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approves for access to the NIPRNET. Social Security Number; date and place of birth; mothers maiden name. The physical security of the device. It contains certificates for identification, encryption, and digital signature. 7bqM8>EM3:N2/YX-4}Y>9> Who is responsible for information/data security? Which is an untrue statement about unclassified data? https://intranet.hhs.gov/about-hhs/national-security/policy/gfe-foreign-travel-2018. correct. In setting up your personal social networking service account, what email address should you use? Unless stated otherwise below or in the relevant competition document, all information you provide to us as part of your proposal, that is not already available to us from other sources, will be handled in confidence. c. Classified information that is intentionally moved to a lower protection level without authorization. Report the suspicious behavior in accordance with their organizations insider threat policy. Insiders are given a level of trust and have authorized access to Government information systems. Select the information on the data sheet that is protected health information (PHI). Understanding and using the available privacy settings. the act of publicly documenting and sharing information is called. What security device is used in email to verify the identity of sender? How do you respond? Which Of The Following Is Not A Correct Way To Protect CUI. How many potential insiders threat indicators does this employee display? Which of the following best describes the sources that contribute to your online identity. Identity Management Evidence (Incident): Select all violations at this unattended workstation. (removable media) If an incident occurs involving removable media in a Sensitive Compartmented Information Facility (SCIF), what action should you take? What should the owner of this printed SCI do differently? Is it permitted to share an unclassified draft document with a non-DoD professional discussion group? a. Store classified data appropriately in a GSA-approved vault/container. What is the best example of Protected Health Information (PHI)? ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. Compromise of data b. Do not download it. Use of GFE (Incident): Permitted Uses of Government-Furnished Equipment (GFE) A No to all: Viewing or downloading pornography, gambling online, conducting a private money-making venture, using unauthorized software, Illegally downloading copyrighted material, making unauthorized configuration changes. Which of the following is true of Controlled Unclassified Information (CUI)? Which of the following is an example of removable media? lock - Updated Innovation Standard Contract (ISC) document and schedule, the ISC will be used for Themed and Open Call competitions. **Social Networking Which piece if information is safest to include on your social media profile? Which of the following is a best practice for using removable media? In providing Government Property to a Contractor the Contracting Officer must also make sure that a Contractor is not given an unfair competitive advantage over another Contractor who may not have Government Property. 870 Summit Park Avenue Auburn Hills, MI 48057. Do not forward, read further, or manipulate the file; Do not give out computer or network information, Do not follow instructions from unverified personnel. 1.4.6. As well as the technical aspects, value for money will also be taken into consideration during the assessment of your proposal. Which of the following is true about telework? **Home Computer Security What should you consider when using a wireless keyboard with your home computer? Approved Security Classification Guide (SCG). Which of the following is NOT Protected Health Information (PHI)? Government furnished property is a bit of an umbrella term. **Identity management Which of the following is an example of two-factor authentication? Call your security point of contact immediately. c. Be aware of classified markings and all handling caveats. Classified material must be appropriately marked. IncreasDecreaseNormalBalanceBalancesheetaccounts:AssetDebitLiabilityDebitStockholdersEquity:CapitalStockCreditRetainedEarningsCreditDividendsCreditCreditIncomestatementaccounts:RevenueCreditExpense(l)CreditDebit\begin{array}{lcc} It is created or received by a healthcare provider, health plan, or employer. Which of the following does not constitute spillage. What should you do? *Sensitive Information Under which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? The CAC/PIV is a controlled item and contains certificates for: An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? The Government relies on and requires its contractors to provide effective and efficient stewardship of the . Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. A system reminder to install security updates b. Which of the following is true of Protected Health Information (PHI)? %PDF-1.7 % Identification, encryption, and digital signature. How should you respond? It is often the default but can be prevented by disabling the location function. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? Which of the following is a best practice for physical security? They can become an attack vector to other devices on your home network. **Mobile Devices Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Which of the following represents a good physical security practice? Never allow sensitive data on non-Government-issued mobile devices. You check your bank statement and see several debits you did not authorize. Not the websites URL. Note that all bought-in items will become our property and will be registered as government-furnished assets (GFA). Only documents that are classified Secret, Top Secret, or SCI require marking. Which of the following is true of Security Classification Guides? Intellectual Property in the ISC is in most cases managed according to the MOD standard intellectual property contract condition for fully funded research contracts DEFCON 705. What threat do insiders with authorized access to information or information systems pose? Ensure proper labeling by appropriately marking all classified material. This HHS Policy supersedes the CMS ARS 3.0 CM-2 Enhancement 7 Configure Systems or Components for High Risk Areas control. What type of social engineering targets particular individuals, groups of people, or organizations? We fund innovative and exploitable ideas that could lead to an advantage for UK armed forces and national security, and support UK prosperity. Refer the vendor to the appropriate personnel. **Physical Security What is a good practice for physical security? Correct. Which of the following is true of protecting classified data? HTKo1[05R4I)RJU=,erh"swJ-k{fo^f^``rf@g]8/u W} @;%m[=jo#UzAk/^)-weH+fX*miP\h6x~0%Agmzw@ 8p2=x"?|ON(K\4n#ikux>mKN|7+>e{yd( 3*aH l+m,t~$ =gP}HN)/xO?y^m\.G!$;\tOE :Q (Sensitive Information) What should you do if a commercial entity, such as a hotel reception desk, asks to make a photocopy of your Common Access Card (CAC) for proof of Federal Government employment? Which of the following individuals can access classified data? How should you secure your home wireless network for teleworking? (Malicious Code) Which email attachments are generally SAFE to open? \text{Expense}&(l)&\text{Credit}&\text{Debit}\\ To help us improve GOV.UK, wed like to know more about your visit today. Which of the following is true of the Common Access Card (CAC)? (GFE) When can you check personal e-mail on your Government-furnished equipment (GFE)? **Classified Data Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? CPCON 1. Which of the following is NOT Government computer misuse? Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIV) card. How many potential insider threat indicators is Bob displaying? Which of the following is NOT a social engineering tip? They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities.

Republic Tv Anchors List Name, Safety Harbor Spa Tiki Bar Menu, What Is Morrell Snow Cap Lard Made Of Pork, 70th Birthday Signature Drink Names, Articles P