Can sensitive information be stored on any password protected system?
Sensitive information may be stored on any password-protected system. Select the information on the data sheet that is personally identifiable information (PII) but not protected health information (PHI).
What is the best way to protect your CAC?
To protect the information on your CAC, you should never tell anyone your PIN or write it down where it can be easily found. Your PIN should be kept secure at all times, just like your Social Security Number.
Best practices for the session cookies:
- Do not store any critical information in cookies. …
- Set expiration dates on cookies to the shortest practical time. …
- Consider encrypting information in cookies.
- Consider setting the Secure and HttpOnly properties on the cookie to true.
What actions should you take upon hearing a discussion involving sensitive compartmented information?
What actions should you take upon hearing a discussion involving Sensitive Compartmented Information (SCI) while seated in a cafeteria with an SCI Facility (SCIF)? Remind those involved that such a discussion should not take place in common areas within a SCIF.
What are the requirements to be granted access to sensitive compartmented information?
Access to SCI is only granted to individuals who have a need-to-know, have been granted a Top Secret clearance by Personnel Security (PerSec), and are approved by the Department of Commerce’s Intelligence Community granting agency, and only upon completion of a separate Nondisclosure Agreement, the IC Form 4414.
Which is not a sufficient way to protect your identity?
Understanding and using available privacy settings. Which is NOT a sufficient way to protect your identity? Use a common password for all your system and application logons. Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct?
Which is a rule for removable media?
What is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Do not use any personally owned/non-organizational removable media on your organization’s systems. You just studied 2 terms!
What helps protect from spear phishing?
How to Protect Yourself against Spear Phishing
- Keep your systems up-to-date with the latest security patches. …
- Encrypt any sensitive company information you have. …
- Use DMARC technology. …
- Implement multi-factor authentication wherever possible. …
- Make cybersecurity a company focus.
Which of the following is the best example of protected health information?
Health information such as diagnoses, treatment information, medical test results, and prescription information are considered protected health information under HIPAA, as are national identification numbers and demographic information such as birth dates, gender, ethnicity, and contact and emergency contact …
What can malicious code do?
Malicious code includes viruses, trojan horses, worms, macros, and scripts. They can damage or compromise digital files, erase your hard drive and/or allow hackers access to your PC or mobile from a remote location.
When should a security badge be visible?
When is it appropriate to have your securing badge visible with a sensitive compartmented information facility? At all time when is the facility.
What must you ensure before transmitting personally identifiable information?
What must you ensure before transmitting Personally Identifiable Information (PII) or Protected Health Information (PHI) via e-mail? Transmissions must be between Government e-mail accounts and must be encrypted and digitally signed when possible. … Encrypt the e-mail and use your Government e-mail account.