What information should you avoid posting on social networking sites? Spillage occurs when information is spilled from a higher classification or protection level to a lower classification or protection level. Three or more. a. Unclassified information cleared for public release. Always check to make sure you are using the correct network for the level of data. You must have your organizations permission to telework c. You may use unauthorized software as long as your computers antivirus software is up to date. Damage 870 Summit Park Avenue Auburn Hills, MI 48057. (Spillage) Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? Software that installs itself without the user's knowledge. Here you can find answers to the DoD Cyber Awareness Challenge. Understanding and using the available privacy settings. What should you do? A man you do not know is trying to look at your Government-issued phone and has asked to use it. What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF? It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. Linda encrypts all of the sensitive data on her government-issued mobile devices. Avoid talking about work outside of the workplace or with people without a need-to-know, Report the suspicious behavior in accordance with their organization's insider threat policy. What action should you take? Mobile Devices (Incident): When is it okay to charge a personal mobile device using government-furnished equipment (GFE)? How should you secure your home wireless network for teleworking? Controlled Unclassified Information: (Incident) Which of the following is NOT a correct way to protect CUI? Sensitive Compartmented Information (Incident #2): What should the owner of this printed SCI do differently? Permitted Uses of Government-Furnished Equipment (GFE). Purpose: This instruction memorandum (IM) provides . Limited Rights Versions contain both Foreground Information and Background Information, the latter being information not generated under the work we contract with you e.g.