Which of the following is a good practice to avoid email viruses? UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. How can you protect your information when using wireless technology? Infographic - Text version Infographic [PDF - 594 KB] Report a problem or mistake on this page Date modified: 2020-12-14 Which of these is true of unclassified data? Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Select the information on the data sheet that is protected health information (PHI). Cyber Awareness Flashcards by Jedi Master | Brainscape Which of the following does not constitute spillage. Which of the following is a best practice for physical security? Who can be permitted access to classified data? 1.1.2 Classified Data. Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. What should you do? They broadly describe the overall classification of a program or system. ~A coworker brings a personal electronic device into a prohibited area. Store it in a General Services Administration (GSA)-approved vault or container. Everything you need to know aboutControlled UnclassifiedInformation(CUI). Social Security Number, date and place of birth, mothers maiden name. Social Security Number; date and place of birth; mothers maiden name. Log in for more information. Remove security badge as you enter a restaurant or retail establishment. All of these. Which of the following should you NOT do if you find classified information on the internet? Report the crime to local law enforcement. correct. Store classified data appropriately in a GSA-approved vault/container when not in use. ?Access requires Top Secret clearance and indoctrination into SCI program.??? What information relates to the physical or mental health of an individual? *Spillage A user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization.

Coin Change Greedy Algorithm Time Complexity, Articles W