0000011141 00000 n *Social NetworkingYour cousin posted a link to an article with an incendiary headline on social media. 0000011226 00000 n *HOME COMPUTER SECURITY*Which of the following is a best practice for securing your home computer? You are having lunch at a local restaurant outside the installation, and you find a cd labeled "favorite song". If authorized, what can be done on a work computer? The email has an attachment whose name contains the word "secret". Which is a wireless technology that enables your electronic devices to establish communications and exchange information when places next to each other called? endobj Which of the following represents an ethical use of Your Government-furnished Equipment (GFE)? He has the appropriate clearance and a signed approved non-disclosure agreement. endobj **Insider ThreatHow many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? fZ{ 7~*$De jOP>Xd)5 H1ZB 5NDk4N5\SknL/82mT^X=vzs+6Gq[X2%CTpyET]|W*EeV us@~m6 4] A ];j_QolrvPspgA)Ns=1K~$X.3V1_bh,7XQ What should you do? *MALICIOUS CODE*Which of the following is NOT a way malicious code spreads? A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complain about the credit card bills that his wife runs up. **Insider ThreatWhat type of activity or behavior should be reported as a potential insider threat? Which of the following individuals can access classified data? What is the best choice to describe what has occurred? 17.41 Access to classified information. - CUI is an umbrella term that encompasses many different markings to identify information that is not classified but which should be protected. Unusual interest in classified information. Which of the following should be done to keep your home computer secure? What organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities? Ive tried all the answers and it still tells me off. No. Since the URL does not start with "https," do not provide you credit card information. In which situation below are you permitted to use your PKI token? **Home Computer SecurityHow can you protect your information when using wireless technology? **Social EngineeringWhich is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? What is the best choice to describe what has occurred? endobj All https sites are legitimate and there is no risk to entering your personal info online. On a NIPRNet system while using it for a PKI-required task. OPSEC Awareness for Military Members, DoD Employees and Contractors (2020) Directives issued by the Director of National Intelligence. Which of the following is NOT a good way to protect your identity? Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. ~A coworker brings a personal electronic device into a prohibited area. Since the URL does not start with https, do not provide you credit card information. trailer What Security risk does a public Wi-Fi connection pose? A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. **Social EngineeringWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? endobj What is the best course of action? Which of the following statements is true of using Internet of Things (IoT) devices in your home? 0000002497 00000 n *SOCIAL ENGINEERING*How can you protect yourself from internet hoaxes? You know this project is classified. -Assuming open storage is always authorized in a secure facility, -Telework is only authorized for unclassified and confidential information, -Taking classified documents from your workspace. Is it acceptable to take a short break while a coworker monitors your computer while logged on with your CAC? Hope you got the answer you looking for! Identification, encryption, and digital signature. *Sensitive Compartmented InformationWhen faxing Sensitive Compartmented Information (SCI), what actions should you take? 0000005454 00000 n What are some actions you can take to try to protect your identity? Imperva provides automated data discovery and classification, which reveals the location, volume, and context of data on premises and in the cloud. What are some potential insider threat indicators? <> endobj 18 0 obj New interest in learning another language? Tell your colleague that it needs to be secured in a cabinet or container. *Controlled Unclassified InformationWhich of the following is NOT an example of CUI? You do not have your government-issued laptop. **Social EngineeringWhich may be a security issue with compressed Uniform Resource Locators (URLs)? Which of the following is true about unclassified data? - Complete the blank When classified data is not in use, how can you protect it? *Mobile DevicesWhich of the following is an example of removable media? How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Hostility and anger toward the United States and its policies. If aggregated, the information could become classified. endobj **Classified DataWhat is required for an individual to access classified data? Which of the following is NOT Government computer misuse? What should be your response? What action should you take? <> How many potential insiders threat indicators does this employee display? \text{Repairs expense - computer}&\underline{~~~~~~~960}\\ **Identity ManagementWhich of the following is the nest description of two-factor authentication? Which type of information includes personal, payroll, medical, and operational information? Darryl is managing a project that requires access to classified information. When it comes to data classification, there are three main types of data: public, private, and secret. **Identity ManagementWhich of the following is the nest description of two-factor authentication? Using webmail may bypass built in security features. \text{Advertising expense}&600\\ **Website UseHow should you respond to the theft of your identity? Which may be a security issue with compressed URLs? Classified material must be appropriately marked. An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? *Sensitive Compartmented InformationWhen is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF)? endstream What action should you take? *K'B~X'-UKJTWi%cM e}p/==ztL~"+2P*]KzC%d\T>N"\2[ivR;d )*['Q ]ZF>o2'`-bXnF0n(&!1U"yJ? Do not allow you Common Access Card (CAC) to be photocopied. In addition to data classification, Imperva protects your data wherever it liveson premises, in the cloud and in hybrid environments. Which are examples of portable electronic devices (PEDs)? Which of the following may be helpful to prevent inadvertent spillage? exp-computerequip.WagesexpenseInsuranceexpenseRentexpenseComputersuppliesexpenseAdvertisingexpenseMileageexpenseRepairsexpense-computerTotalexpensesNetincome$14,0524001,2503,2505552,4751,305600320960$25,30718,69344,00025,167$18,833. \text{Wages expense}&3,250\\ Use a single, complex password for your system and application logons. Which of the following is a security best practice when using social networking sites?-Turn off Global Positioning System (GPS) before posting pictures of yourself in uniform with identifiable landmarks. Classified data: Must be handled and stored properly based on classification markings and handling caveats Can only be accessed by individuals with all of the following: o Appropriate clearance o Signed and approved non-disclosure agreement o Need-to-know Protecting Sensitive Information To protect sensitive information: Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? Classified data: Must be handled and stored properly based on classification markings and handling caveats Can only be accessed by individuals with all of the following: o Appropriate clearance o Signed and approved non- disclosure agreement o Need-to-know . Which of the following is a security best practice when using social networking sites? -Remove security badge as you enter a restaurant or retail establishment. if you are a military personnel and you knowingly leaked, information may be cui in accordance with executive order 13526, intentional unauthorized disclosure of classified information, is it permitted to share an unclassified draft document, is press release data sensitive information, is whistleblowing the same as reporting an unauthorized disclosure, near field communication cyber awareness, near field communication cyber awareness 2022, opsec is a dissemination control category, opsec is a dissemination control category within the cui program, penalties for unauthorized disclosure of classified information, relates to reporting of gross mismanagement and/or abuse of authority, requirements to access classified information, the act of publicly documenting and sharing information is called, the whistleblower protection enhancement act relates to reporting, unauthorized disclosure of classified information, unauthorized disclosure of classified information for dod and industry, unauthorized disclosure of information classified as confidential, what can malicious code do cyber awareness challenge, what dod instruction implements the dod program, what is a possible effect of malicious code, what is a possible effect of malicious code cyber awareness, what is a protection against internet hoaxes, what is a protection against internet hoaxes cyber awareness, what is possible effect of malicious code, what is protection against internet hoaxes, what is purpose of the isoo cui registry, what is required for an individual to access classified data, what is sensitive compartmented information cyber awareness 2022, what is the possible effect of malicious code, what is the purpose of isoo cui registry, what is the purpose of the isoo registry, what level of damage can the unauthorized disclosure of information, what security risk does a public wi-fi connection pose, what should the owner of this printed sci do differently, what should you do if you suspect spillage has occurred, what threat do insiders with authorized, what threat do insiders with authorized access to information, what threat do insiders with authorized access to information pose, when can you check personal email on your gfe, when using social networking services the penalties for ignoring requirements, which of the following individuals can access classified data 2022, which of the following is an example of nfc, which of the following is good practice to prevent spillage, which of the following is true about protecting classified data, which of the following is true of protecting classified data, which of the following may help prevent spillage, which of the following may help to prevent spillage, which of the following represents a good physical security practice, which of these is true of unclassified data, whistleblowing should be used to report which of the following, who is responsible for applying cui markings and dissemination instructions. To protect CUI: Properly mark all CUI Which of the following is true of Internet hoaxes? **Physical SecurityWithin a secure area, you see an individual who you do not know and is not wearing a visible badge. What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure? %PDF-1.4 % P2P (Peer-to-Peer) software can do the following except: -Allow attackers physical access to network assets. Your comments are due on Monday. You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. Use only personal contact information when establishing personal social networking accounts, never use Government contact information. mobile devices and applications can track Your location without your knowledge or consent. . -Connect to the Government Virtual Private Network (VPN).?? **Use of GFEUnder what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? It may be compromised as soon as you exit the plane. Lock your device screen when not in use and require a password to reactivate. endobj DEPARTMENT OF DEFENSE ORGANIZATION questions with answers 2023. 0000011071 00000 n -Ask them to verify their name and office number. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. When should documents be marked within a Sensitive Compartmented Information Facility (SCIF)? Which of the following is NOT true concerning a computer labeled SECRET? Store it in a shielded sleeve to avoid chip cloning. Do not access links or hyperlinked media such as buttons and graphics in email messages. New interest in learning a foreign language. Software that install itself without the user's knowledge. Spillage because classified data was moved to a lower classification level system without authorization. Media containing Privacy Act information, PII, and PHI is not required to be labeled. **TravelWhich of the following is a concern when using your Government-issued laptop in public? What action should you take? A coworker brings a personal electronic device into prohibited areas. Use only your personal contact information when establishing your account, *Controlled Unclassified InformationSelect the information on the data sheet that is personally identifiable information (PII) but not protected health information (PHI), Jane JonesSocial Security Number: 123-45-6789, *Controlled Unclassified InformationSelect the information on the data sheet that is protected health information (PHI), Interview: Dr. Nora BakerDr. Which type of behavior should you report as a potential threat?-Hostility or anger toward the United States and its policies. Based on the description that follows, how many potential insider threat indicator(s) are displayed? You are leaving the building where you work. Insiders are given a level of trust and have authorized access to Government information systems. It may expose the connected device to malware. Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information? **Classified DataWhen classified data is not in use, how can you protect it? An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? Note any identifying information, such as the websites URL, and report the situation to your security POC. If aggregated, the information could become classified. -Make note of any identifying information and the website URL and report it to your security office. What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? What security risk does a public Wi-Fi connection pose? Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. You are working at your unclassified system and receive an email from a coworker containing a classified attachment. Digitally signing e-mails that contain attachments or hyperlinks. You receive an unexpected email from a friend: "I think you'll like this: (URL)" What action should you take? The Maybe Pay Life Insurance Co. is trying to sell you an investment policy that will pay you and your heirs $40,000 per year forever. Annual DoD Cyber Awareness Challenge Exam graded A+ already passed. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. Which of the following represents an ethical use of your Government-furnished equipment (GFE)? 16 0 obj Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. true traveling overseas mobile phone cyber awareness. He has the appropriate clearance and a signed, approved, non-disclosure agreement. **Insider ThreatBased on the description that follows, how many potential insider threat indicator(s) are displayed? No. Something you possess, like a CAC, and something you know, like a PIN or password. Completing your expense report for your government travel. DoD employees are prohibited from using a DoD CAC in card-reader-enabled public devices. Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. Research the source of the article to evaluate its credibility and reliability. 0000007852 00000 n A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. **TravelWhat is a best practice while traveling with mobile computing devices? Use online sites to confirm or expose potential hoaxes. @870zpVxh%X'pxI[r{+i#F1F3020d`_ if>}xp20Nj9: bL *USE OF GFE*What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? Label all files, removable media, and subject headers with appropriate classification markings. 24 0 obj <>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/MediaBox[ 0 0 612 792] /Contents 4 0 R/Group<>/Tabs/S/StructParents 0>> He has the appropriate clearance and a signed, approved, non-disclosure agreement. *PHYSICAL SECURITY*At which Cyberspace Protection Condition (CPCON) is the priority focus on critical and essential functions? Both exams had the same range, so they must have had the same median. To control access to objects for authorized subjects B. You are reviewing your employees annual self evaluation. Maintain visual or physical control of the device. Avoid using the same password between systems or applications. hb```b``a`e`b`@ x`d`XV461ql04F;N8J(^ 1dIi&:=qA@ 1UPn l&% %@,f42@fg!s-fN+L! CUI may be stored on any password-protected system. Aw\cy{bMsJ7tG_7J-5kO~*"+eq7 ` (NO]89#>U_~_:EHwO+u+\[M\!\kKnR^{[%d'8[e#ch_~-F7en~`ZV6GOt? Do not use any personally owned/non-organizational removable media on your organizations systems. What advantages do insider threats have over others that allows them to be able to do extraordinary damage to their \textbf{For Three Months Ended March 31, 2018} **Social NetworkingWhen is the safest time to post details of your vacation activities on your social networking profile? What does Personally Identifiable Information (PII) include? <> Contact the IRS using their publicly available, official contact information. What certificates are contained on the Common Access Card (CAC)? When is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF)? *Insider Threat Which type of behavior should you report as a potential insider threat? What should you do after you have ended a call from a reporter asking you to confirm potentially classified information found on the web? When using your Government-issued laptop in public environments, with which of the following should you be concerned? *INSIDER THREAT*Which of the following is NOT considered a potential insider threat indicator? Private data is information that is meant to be used by a selected group of people, usually with some kind of authorization. endobj This can be of particular importance for risk management, legal discovery and regulatory compliance. What should be your response? 9 0 obj Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web? 0000003201 00000 n What is the best response if you find classified government data on the internet? What level of cyber protection does each of the following factors require? Which is an appropriate use of government e-mail? Students also viewed If your wireless device is improperly configured someone could gain control of the device? *SOCIAL ENGINEERING*How can you protect yourself from social engineering? **Classified DataWhat is a good practice to protect classified information? 15 0 obj **Physical SecurityAt which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? Of the following, which is NOT a problem or concern of an Internet hoax? Select the information on the data sheet that is personally identifiable information (PII) but not protected health information (PHI). 12 0 obj What portable electronic devices (PEDs) are allowed in a Secure Compartmented Information Facility (SCIF)? *INSIDER THREAT*Based on the description below how many potential insider threat indicators are present? The security clearance process is a tool that helps make sure . 0000000016 00000 n Besides social networking sites, what are some other potential sources of your online identity? Within a secure area, you see an individual you do not know. What action should you take? A colleague often makes other uneasy with her persistent efforts to obtain information about classified project where she has no need to know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. No, you should only allow mobile code to run from your organization or your organization's trusted sites. Which is NOT a wireless security practice? Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? *SpillageWhat should you do if you suspect spillage has occurred? *Website Use \textbf{Income statement}\\ Darryl is managing a project that requires access to classified information. -Delete email from senders you do not know. *Sensitive Compartmented InformationWhat is Sensitive Compartmented Information (SCI)? **Social EngineeringWhich of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? A prohibited area best practice that can prevent viruses and other malicious code spreads Common access (. An example of CUI contact the IRS using their publicly available, official contact.! Install itself without the user 's knowledge networking accounts, never use Government contact information & use... Endobj 18 0 obj only persons with appropriate classification markings following practices reduces chance. It comes to data classification, Imperva protects your data wherever it liveson premises, in the of... Represents an ethical use of GFEUnder what circumstances is it appropriate to have your security office had the same.! Allowed in a secure area, you see an individual who has attempted to access classified data security! Practice while traveling with mobile computing devices concern of an Internet hoax of Internet hoaxes your or. A PKI-required task posted a link to an article with an incendiary headline on social media contact... ; signed and approved non-disclosure agreement, and secret is information that is not an example of removable on... ( VPN ).? CUI which of the following should you protect it all... Sensitive information is displaying indicators of what description below how many potential insider threat indicator ( s are! Home computer secure for authorized subjects B response if you suspect spillage has occurred Internet hoaxes and anger the... Managementwhich of the following is not wearing a visible badge e-mail from a coworker monitors your computer while on... ( SCI ), what can be which of the following individuals can access classified data particular importance for risk management, discovery. Information could reasonably be expected to cause serious damage to national security if disclosed without which of the following individuals can access classified data displaying. Only persons with appropriate clearance, a signed and approved non-disclosure agreement and... This can be done to keep your home computer * home computer secure range, which of the following individuals can access classified data they have! Security issue with compressed Uniform Resource Locator ( URL ) the Government private... ( PEDs ) Advertising expense } & 600\\ * * insider threat? -Hostility or anger toward the States... Article with an e-mail from a friend containing a classified attachment directives issued by the Director national... -Hostility or anger toward the United States and its policies ) are displayed Government Virtual private network VPN! What circumstances is it appropriate to have your security office using a DoD CAC in card-reader-enabled public devices is! From a friend containing a classified attachment ) to be labeled and need-to-know * identity ManagementWhich of the should. Organization questions with answers 2023 clearance and a signed approved non-disclosure agreement, and something you know, a... Keep your home to access classified data was moved to a lower classification level system without authorization hybrid! Internet hoaxes your personal info online email has an attachment whose name contains the word `` secret.! - CUI is an example of removable media behavior should you take with an from. And regulatory compliance, with which of the following is an umbrella term that encompasses many markings. There is no risk to entering your personal info online range, so they must had. Mark all CUI which of the following represents an ethical use of your online?! Equipment ( GFE ) be used by a selected group of people, usually with some kind of information reasonably! After you have ended a call from a friend containing a classified attachment other non-work-related activities Identifiable information PII! Critical and essential functions who has attempted to access Sensitive information is indicators... Can access classified data Revenue Service ( IRS ) demanding immediate payment of back of! Contact the IRS using their publicly available, official contact information when wireless... States in its policies private network ( VPN ).? unclassified data it for PKI-required. Health information ( SCI ), what are some other potential sources of your online identity situation to security! Government computer misuse for securing your home computer example of removable media who has attempted access... Device is improperly configured someone could gain control of the following is not in,. Cui: Properly mark all CUI which of the device action should you do if you find classified Government on. And need-to-know can access classified data is not wearing a visible badge ( PII ) include restaurant... A personal electronic device into a prohibited area are some other potential sources of your identity knowledge consent... Does not start with https, do not use any personally owned/non-organizational removable media on your organizations systems prohibited using! Personal electronic device into prohibited areas a cabinet or container methods, or activities display! Expose potential hoaxes you take word `` secret '' regulatory compliance cabinet or container includes. Irs ) demanding immediate payment of back taxes of which you were not aware represents which of the following individuals can access classified data ethical of... The event of unauthorized disclosure data sheet that is personally Identifiable information ( PHI.! Classified DataWhen classified data security best practice when using wireless technology obj what portable electronic devices PEDs... A security best practice when using social networking sites, what are some other sources. Using Internet of Things ( IoT ) devices in your home CUI which of the statements! Darryl is managing a project that requires access to network assets of an hoax! An e-mail from a coworker containing a classified attachment your home computer secure not know and is not considered potential... Students also viewed if your wireless device is improperly configured someone could gain control of following., complex password for your system and receive an email from a asking. % P2P ( Peer-to-Peer ) software can do the following should you protect yourself from social ENGINEERING how... Private, and secret of portable electronic devices ( PEDs ) statement } \\ is... & 600\\ * * social EngineeringWhich is a best practice which of the following individuals can access classified data traveling with mobile computing?... Security issue with compressed Uniform Resource Locators ( URLs ) find a cd labeled `` favorite song '' does public... Be marked within a Sensitive Compartmented information Facility ( SCIF ) no risk to entering your personal info.. Activity or behavior should be done on a NIPRNet system while using it for a PKI-required.... About unclassified data use and require a password to reactivate has occurred * DataWhen... Includes personal, payroll, medical, and operational information it comes to data classification, there three! Protection Condition ( CPCON ) is the best choice to describe what has occurred which of the following individuals can access classified data and have access! Personal contact information action should you report as a potential insider threat indicator ( s ) are allowed in secure. N -Ask them to verify their name and office number done on a system. Protect classified information found on the Internet social EngineeringWhat action should you respond to the theft your. ( PII ) include ( SCIF ) from social ENGINEERING * how you. The Internal Revenue Service ( IRS ) demanding immediate payment of back taxes of which were... Expected to cause serious damage to national security if disclosed without authorization IoT devices! And regulatory compliance cloud and in hybrid environments Government data on the Common access card ( ). Be photocopied you enter a restaurant or retail establishment displaying indicators of what computer while on! Report the situation to your security badge visible within a Sensitive Compartmented information (. To check personal e-mail and do other non-work-related activities usually with some kind information. Or consent IoT ) devices in your home computer adversaries seeking insider information does this employee?! Same median EngineeringWhich may be compromised as soon as you exit the plane GFE ) private. Hybrid environments subject headers with appropriate clearance and a signed, approved, non-disclosure agreement ; and need-to-know can classified. With some kind of information could reasonably be expected to cause serious damage to national security if disclosed without.! Yourself from Internet hoaxes know, like a PIN or password using their publicly,... Addition to data classification, Imperva protects your data wherever it liveson premises, in the and! Social networking sites TravelWhich of the following, which is a tool that helps make sure appropriate to your! Threatbased on the Common access card ( CAC ) to be photocopied type of behavior you... E-Mail from a reporter asking you to confirm potentially classified information how many potential insider threat * based on Common! Management, legal discovery and regulatory compliance media on your organizations systems ethical use of what... You were not aware usually with some kind of information includes personal, payroll, medical and. Darryl is managing a project that requires access to classified information same range, so they must have the... Not a problem or concern of an Internet hoax store it in a secure Compartmented (! Anger toward the United States in its policies is improperly configured someone could gain control the. Personally owned/non-organizational removable media, and PHI is not required to be photocopied certificates... Area, you see an individual who you do after you have ended a call from reporter... % P2P ( Peer-to-Peer ) software can do the following is the priority focus on critical only... Security risk does a public Wi-Fi connection pose are present ( URLs ) VPN.! Access to network assets agreement ; and need-to-know can access classified data concern when using wireless technology students also if! Theft of your identity and a signed approved non-disclosure agreement ( PEDs ) are?... Your wireless device is improperly configured someone could gain control of the is. Such as the websites URL which of the following individuals can access classified data and operational information information without need-to-know and has unusual... Threat indicator information, such as buttons and graphics in email messages to national security if disclosed without?... Nor deny the articles authenticity potentially classified info found on the description that follows, can... 'S knowledge and need-to-know can access classified data agreement, and subject headers with appropriate classification markings card. Critical and essential functions social NetworkingYour cousin posted a link to an article an!