Quick Answer: What Describes A Sensitive Compartmented Information SCI Program Quizlet?

What is a protection against Internet hoaxes quizlet?

What is a protection against internet hoaxes.

Use online sites to confirm or expose potential hoaxes..

What are the requirements to be granted access to SCI quizlet?

What are the requirements to be granted access to SCI material? The proper security clearance and indoctrination into the SCI program. What organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities? Department of Defense.

What are the 5 levels of security clearance?

National Security Clearances are a hierarchy of five levels, depending on the classification of materials that can be accessed—Baseline Personnel Security Standard (BPSS), Counter-Terrorist Check (CTC), Enhanced Baseline Standard (EBS), Security Check (SC) and Developed Vetting (DV).

What is an indication that malicious code is running on your system quizlet?

What is a possible indication of a malicious code attack in progress? A pop-up window that flashes and warns that your computer is infected with a virus.

What describes how sensitive compartmented information is marked cyber awareness?

SCI is a classification label indicating that items or information is sensitive and part of a specific program or department. The program office, or GCA determines what is SCI and identifies it with proper classification markings. Not everyone will have access to this SCI information.

What describes how sensitive compartmented information is marked quizlet?

Sensitive Compartmented Information: Classified information concerning or derived from intelligence sources, methods, or analytical processes, which is required to be handled within formal access control systems established by the Director of Central Intelligence. … SCI must be stored in GSA approved security containers.

What are examples of malicious code cyber awareness?

Malicious code includes viruses, trojan horses, worms, macros, and scripts. They can damage or compromise digital files, erase your hard drive and/or allow hackers access to your PC or mobile from a remote location.

What can malicious code do quizlet?

What is malicious code? any code in a software system or script intended to cause undesired effects, security breaches or damage to a system. … it cannot be prevented by using conventional antivirus software alone. You just studied 9 terms!

Which is a rule for removable media?

What is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Do not use any personally owned/non-organizational removable media on your organization’s systems.

What describes a sensitive compartmented information SCI program?

Sensitive Compartmented Information (SCI) is information about certain intelligence sources and methods and can include information pertaining to sensitive collection systems, analytical processing, and targeting, or which is derived from it.

What is the best example of personally identifiable information?

Personally identifiable information, or PII, is any data that could potentially be used to identify a particular person. Examples include a full name, Social Security number, driver’s license number, bank account number, passport number, and email address.

Do you require access to sensitive compartmented information?

The answer is No. As the definition of SCI states, there is a requirement that the individual has a need to obtain the information and is read into the program. … SCI access can also be granted at the Secret level as well. Sensitive Compartmented Information (SCI) is a subset of classified national intelligence.

What is the best description of two factor authentication cyber awareness?

Two-factor authentication (sometimes called “two-step verification”) combines something you know — your username and password, with something you have — such as your phone or a physical security key, or even something you are — like your fingerprint or another biometric, as a way of confirming that a person is …

What is a best practice while traveling with mobile computing devices?

On-Travel Guidance Maintain positive physical control of devices at all times (Do not leave in hotel safe). Turn off unused wireless communications (e.g., Bluetooth, NFC, Wi-Fi). Disable GPS and location services (unless required). Do not connect to open Wi-Fi networks.

What is a sensitive compartmented information clearance?

Sensitive compartmented information (SCI) is a type of classified information controlled through formal systems established by the Director of National Intelligence. … Therefore, it is sufficient to declare that a candidate possesses a TS/SCI clearance with a polygraph.