Which of these steps should you take on social media to limit your vulnerability Quizlet

Recommended textbook solutions

Which of these steps should you take on social media to limit your vulnerability Quizlet

Social Psychology

10th EditionElliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson

525 solutions

Which of these steps should you take on social media to limit your vulnerability Quizlet

Human Resource Management

15th EditionJohn David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine

249 solutions

Which of these steps should you take on social media to limit your vulnerability Quizlet

Anderson's Business Law and the Legal Environment, Comprehensive Volume

23rd EditionDavid Twomey, Marianne Jennings, Stephanie Greene

369 solutions

Which of these steps should you take on social media to limit your vulnerability Quizlet

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Recommended textbook solutions

Which of these steps should you take on social media to limit your vulnerability Quizlet

Chemistry for Engineering Students

2nd EditionLawrence S. Brown, Thomas A. Holme

945 solutions

Which of these steps should you take on social media to limit your vulnerability Quizlet

Chemical Reaction Engineering

3rd EditionOctave Levenspiel

228 solutions

Which of these steps should you take on social media to limit your vulnerability Quizlet

Fundamentals of Engineering Economic Analysis

1st EditionDavid Besanko, Mark Shanley, Scott Schaefer

215 solutions

Which of these steps should you take on social media to limit your vulnerability Quizlet

Introduction to Engineering Experimentation

3rd EditionAhmad R. Ganji, Anthony J. Wheeler

378 solutions

Recommended textbook solutions

Which of these steps should you take on social media to limit your vulnerability Quizlet

Advanced Engineering Mathematics

10th EditionErwin Kreyszig

4,134 solutions

Which of these steps should you take on social media to limit your vulnerability Quizlet

Chemical Reaction Engineering

3rd EditionOctave Levenspiel

228 solutions

Which of these steps should you take on social media to limit your vulnerability Quizlet

Chemistry for Engineering Students

2nd EditionLawrence S. Brown, Thomas A. Holme

945 solutions

Which of these steps should you take on social media to limit your vulnerability Quizlet

Engineering Circuit Analysis

9th EditionJack E. Kemmerly, Steven M. Durbin, William H. Hayt

785 solutions

Accessing systems at unusual hours without authorization

Keeping unauthorized backups

Hoarding files, data, code, and programs

Knowingly bypassing technology-associated security rules/protocols

Improper use of privileged access

Using unauthorized technical devices in the workplace

Home

Subjects

Expert solutions

Create

Log in

Sign up

Upgrade to remove ads

Only ₩37,125/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (28)

Sharing details of your personal and professional lives or life online makes you ___________________ adversaries.

more vulnerable to

Which of these activities must be reported? Select all that apply.

-bypassing security rules or protocols
-unauthorized disclosure of classified material
-inappropriate copying of classified material

Which of the countermeasures can you implement to help reduce technology-associated insider threats? Select all that apply.

-take security training courses
-prevent unauthorized data access
-use strong passwords
-keep unauthorized software from secure environments

A coworker shares that she and her husband are facing foreclosure, and she doesn't know what to do. What should you do? Select all that apply.

-suggest she contact the EAP
-report the indicator to the security office

Insiders may include which of these groups of people? Select all that apply.

-former employees
-contractors
-employees
-active duty military

The definition of Targeted Violence includes which of these components? Select all that apply.

-directed at an individual or a group
-wrong

You observe a colleague with a sudden increased alcohol intake (e.g. frequent heavy consumption, drinking until drunk) what is the appropriate action?

-report the concerning behavior to your security officier

Most inside offenders display concerning behaviors before acting directly against their organization. This behavior may include (select all that apply):

-violation of workplace policies
-failure to follow standard procedures (SOP)
-legal difficulties

Which of these may be considered part of the media? Select all that apply.

-not all of the answers
-not just newspaper reporter

Which of the following are things that adversaries want to know? Select all that apply.

-your organization's personnel
-countries your organization works with
-your company's competitors

_____________ is a a conversation technique used to discretely gather information that is not readily available and do so without raising suspicion.

Elicitation

Technological advances impact the insider threat by _____________. Select all that apply.

-increase risk of information loss
-all insiders to access more data

Which of the following is a technology-related indicator. Select all that apply.

-keeping unauthorized backups
-accessing systems at unusual hours without without authorization

Which of these steps should you take on social media to limit your vulnerability? Select all that apply.

-all answers

You can help reduce technology-associated insider threats by:

-not practicing counterintelligence

Contractors must report which of these? Select all that apply.

-any event that may impact the status of the facility
-anything that affects the proper safeguarding of classified information
-any indication that classified information has been lost or compromised.
-efforts to obtain
-all answers

U.S. Government employees and contractors must report which of the following? Select all that apply.

-foreign contacts

Which of the following are true about insider threats?

-all answers

Which of the following means to deliberately destroy, damage, or obstruct, especially for political or military advantage?

sabotage

Which of the following is considered a potential insider threat vulnerability? Select all that apply.

-disgruntlement

Which of the following is a reportable behavioral indicator?

significant change in work habit

If you are contacted by a member of the media about information you are not authorized to share, you should take down which of the following details? Select all that apply.

-physical description
-date and time of contact
-how they contacted you
-their name and their organization name
-wrong

Who might be interested in non-public information that an insider can provide. Select all that apply.

-all answers.

Where can elicitation techniques be used? Select all that apply.

-all answers

Which of these may be targeted by foreign entities? Select all that apply.

-unclassified information
-list of facility locations
-classified information
-personnel lists

Hostile entities may use social media to __________________? Select all that apply.

all answers

Which of the countermeasures can you implement to help reduce technology-associated insider threats? Select all that apply.

-inventory your technology holdings
-never use portable storage devices

Which of the following are behavioral indicators that must be reported?

-excessive debt
-disregard for security procedures and protocols

Sets with similar terms

DoD Cyber Awareness 2019

38 terms

kyle_terry4

DoD Cyber Awareness 2019

38 terms

wolff4780PLUS

C724 : Unit 7 - Test Review

54 terms

rreynolds1313

DOD Cyber Awareness Challenge 2019: Knowledge Chec…

69 terms

ewizzy58

Sets found in the same folder

DoD Insider Threat Awareness

22 terms

TCB_14

DoD Insider Threat Awareness

22 terms

Lester_Chase

Insider Threat Awareness

12 terms

SendD0nationsTEACHER

Insider Threat Awareness OPSEC

32 terms

Slurr

Other sets by this creator

Extra Cards for Final

23 terms

matthewmey23

Ch 12- Pulling It All Together- Dietary Guidelines

37 terms

matthewmey23

Ch 11- Nutrition and Athletic Performance

54 terms

matthewmey23

Ch. 10 Nutrition Basics for Better Health and Perf…

34 terms

matthewmey23

Verified questions

ENGINEERING

A fan draws air from the atmosphere through a 0.30-m- diameter round duct that has a smoothly rounded entrance. A differential manometer connected to an opening in the wall of the duct shows a vacuum pressure of 2.5 cm of water. The density of air is 1.22 kg/m3. Determine the volume rate of air flow in the duct in cubic feet per second. What is the horsepower output of the fan?

Verified answer

ENGINEERING

Steam at 1400 kPa and $350^\circ C$ [state 1] enters a turbine through a pipe that is 8 cm in diameter, at a mass flow rate of $0.1 kg \cdot s^{−1}.$ The exhaust from the turbine is carried through a 25-cm-diameter pipe and is at 50 kPa and $100^\circ C$ [state 2]. What is the power output of the turbine? $$ \begin{array}{ll}{H_{1}=3150.7 \mathrm{kJ} \cdot \mathrm{kg}^{-1}} & {V_{1}=0.20024 \mathrm{m}^{3} \cdot \mathrm{kg}^{-1}} \\ {H_{2}=2682.6 \mathrm{kJ} \cdot \mathrm{kg}^{-1}} & {V_{2}=3.4181 \mathrm{m}^{3} \cdot \mathrm{kg}^{-1}}\end{array} $$

Verified answer

ENGINEERING

Given that $y = c_1 + c_2x^2$ is a two-parameter family of solutions of $xy'' -y' = 0$ on the interval $(-\infty, \infty)$, show that constants $c_1$ and $c_2$ cannot be found so that a member of the family satisfies the initial conditions $y(0) = 0, y' (0) = 1$.

Verified answer

ENGINEERING

What steps do you need to take when preparing to pass a vehicle ahead if you've already determined there are no conflicts from any vehicle behind?

Verified answer

Recommended textbook solutions

Which of these steps should you take on social media to limit your vulnerability Quizlet

Chemistry for Engineering Students

2nd EditionLawrence S. Brown, Thomas A. Holme

945 solutions

Which of these steps should you take on social media to limit your vulnerability Quizlet

Chemical Reaction Engineering

3rd EditionOctave Levenspiel

228 solutions

Which of these steps should you take on social media to limit your vulnerability Quizlet

Introduction to Logic Design

3rd EditionAlan B. Marcovitz

414 solutions

Which of these steps should you take on social media to limit your vulnerability Quizlet

Introduction to Engineering Experimentation

3rd EditionAhmad R. Ganji, Anthony J. Wheeler

378 solutions

Other Quizlet sets

Graphic Arts Midterm Extras

14 terms

Mario32123

History Final Topic Questions

24 terms

kellykeys7

CNA chapter 14

16 terms

Joceline_OchoaPLUS

EC 026- Chapter 8

32 terms

ahoidal

Related questions

QUESTION

What is broadcasting and how is it used in Scratch?

14 answers

QUESTION

When should a PA-DSS policy exception be used to document a security breach when card data is stolen.

4 answers

QUESTION

The Policy Coordinating Committees (PCC) are how many interagency committees established by National Security Presidential Directive (NSPD-1) to coordinate interagency national security policy issues?

7 answers

QUESTION

What is considered to be a core obligation of local community leaders?

8 answers

Which of these step should you take on social media to limit your vulnerability?

Which of these steps should you take on social media to limit your vulnerability? Practicing counterintelligence.

Which of the following countermeasures can you implement to help reduce technology insider threats?

How to minimize the risk of insider threats.
Perform enterprise-wide risk assessments. ... .
Clearly document and consistently enforce policies and controls. ... .
Establish physical security in the work environment. ... .
Implement security software and appliances. ... .
Implement strict password and account management policies and practices..

Which of the following must be reported to the Defense Counterintelligence and Security Agency and the FBI?

Cleared contractors must also report actual, probable, or possible espionage, sabotage, terrorism, or subversion promptly to the Federal Bureau of Investigation (FBI) and DCSA (NISPOM 1-301).

Which of the following is mostly considered an insider threat?

The NITTF defines five main categories of insider threat which we will discuss in this course: leaks, spills, espionage, sabotage, and targeted violence.