Question: What Is A Good Practice To Protect Classified Information?

Which is a rule for removable media?

What is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems.

Do not use any personally owned/non-organizational removable media on your organization’s systems..

Which of the following is the best example of personally identifiable information?

Examples of personally identifiable information (PII) include : Social security number (SSN), passport number, driver’s license number, taxpayer identification number, patient identification number, and financial account or credit card number. Personal address and phone number.

What are some examples of malicious code?

Taking advantage of common system vulnerabilities, malicious code examples include computer viruses, worms, Trojan horses, logic bombs, spyware, adware, and backdoor programs. Visiting infected websites or clicking on a bad email link or attachment are ways for malicious code to sneak its way into a system.

What is the best example of protected health information?

Health information such as diagnoses, treatment information, medical test results, and prescription information are considered protected health information under HIPAA, as are national identification numbers and demographic information such as birth dates, gender, ethnicity, and contact and emergency contact …

Who can access classified data?

Who can be permitted access to classified data? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know.

Which of the following can an unauthorized disclosure of information classified as confidential reasonably be expected to cause?

The unauthorized disclosure of Confidential information could reasonably be expected to cause damage to national security. The unauthorized disclosure of Secret information could reasonably be expected to cause serious damage to national security.

What is the best practice to protect data on your mobile computing device?

What is a best practice to protect data on your mobile computing device? Lock your device screen when not in use and require a password to reactivate.

What describes how sensitive compartmented information is marked cyber awareness?

SCI is a classification label indicating that items or information is sensitive and part of a specific program or department. The program office, or GCA determines what is SCI and identifies it with proper classification markings. Not everyone will have access to this SCI information.

What can malicious code do quizlet?

What is malicious code? any code in a software system or script intended to cause undesired effects, security breaches or damage to a system. Why is it difficult to protect against? it cannot be prevented by using conventional antivirus software alone.

Do you require access to sensitive compartmented information?

The answer is No. As the definition of SCI states, there is a requirement that the individual has a need to obtain the information and is read into the program. … SCI access can also be granted at the Secret level as well. Sensitive Compartmented Information (SCI) is a subset of classified national intelligence.

What is needed for classified information?

Classified information may be made available to a person only when the possessor of the information establishes that the person has a valid “need to know” and the access is essential to the accomplishment of official government duties.

What information is listed in the Classification Authority block on a document?

The classification authority block, or CAB, identifies the authority and duration of classification determination. It indicates who the document was classified by, derived from, what it was downgraded to (if applicable), and when it was declassified.

What describes how sensitive compartmented information?

Sensitive Compartmented Information (SCI) is information about certain intelligence sources and methods and can include information pertaining to sensitive collection systems, analytical processing, and targeting, or which is derived from it.

What is the best way to protect against social engineering quizlet?

The best defense against social engineering attacks is a comprehensive training and awareness program that includes social engineering. The training should emphasize the value of being helpful and working as a team, but doing so in an environment where trust is verified and is a ritual without social stigma.

What is a good practice to protect data on your home wireless systems?

To keep your wireless communication confidential, ensure your personal or ISP-provided WAP is using Wi-Fi Protected Access 2 (WPA2) instead of the much weaker, and easily broken Wired Equivalent Privacy (WEP) or the original WPA. When configuring WPA2, change the default key to a complex, hard-to-guess passphrase.

What describes how sensitive compartmented information is marked quizlet?

Sensitive Compartmented Information: Classified information concerning or derived from intelligence sources, methods, or analytical processes, which is required to be handled within formal access control systems established by the Director of Central Intelligence. … SCI must be stored in GSA approved security containers.

How can we protect removable media?

Removable media should be thoroughly scanned for malware before it is brought in to use or received from any other organisation. Never leave removable media lying around. Lock it securely away when not in use. Disable Bluetooth, Wi-Fi, and other services when you’re not using them.

What is the best protection method for sharing personally identifiable information?

Sensitive. What is the best protection method for sharing Personally Identifiable Information (PII)? Digitally sign and encrypt the email.

Which email attachments are generally safe to open?

Microsoft has classified several types of dangerous extensions; however, only a few are considered safe. These are GIF, JPG or JPEG, TIF or TIFF, MPG or MPEG, MP3 and WAV. These extensions represent different file types and are the formats that the majority of internet users tend to send as email attachments.

What is a protection against Internet hoaxes quizlet?

What is a protection against internet hoaxes? Use online sites to confirm or expose potential hoaxes.

What are examples of removable media?

Removable media and devices include:Optical Discs (Blu-Ray discs, DVDS, CD-ROMs)Memory Cards (Compact Flash card, Secure Digital card, Memory Stick)Zip Disks/ Floppy disks.USB flash drives.External hard drives (DE, EIDE, SCSSI, and SSD)Digital cameras.Smart phones.More items…