Annual DoD Cyber Awareness Challenge Exam

*SpillageAfter reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. You know that this project is classified. How should you respond?

*SpillageWhich of the following may help to prevent spillage?

*SpillageA user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. What is the best choice to describe what has occurred?

*SpillageWhat should you do when you are working on an unclassified system and receive an email with a classified attachment?

*SpillageWhat should you do if a reporter asks you about potentially classified information on the web?

*Spillage.What should you do if a reporter asks you about potentially classified information on the web?

*SpillageWhat should you do if you suspect spillage has occurred?

*SpillageWhich of the following is a good practice to prevent spillage?

*SpillageWhich of the following actions is appropriate after finding classified information on the Internet?

*SpillageWhich of the following may help to prevent spillage?-Verify that any government equipment used for processing classified information has valid anti-virus software before connecting it to the internet-Follow procedures for transferring data to and from outside agency and non-Government networks-Purge the memory of any device removed from a classified network before connecting it to an unclassified network-Process all data at the highest classification or protection level available, including unclassified data

*SpillageYou find information that you know to be classified on the Internet. What should you do?

*SpillageYou Receive an inquiry from a reporter about government information not cleared for public release. How should you respond?-Ignore the inquiry-Refer to reporter to your organization's public affairs office-Gather as much information as possible about the reporter's source-Tell the reporter that the information must not be publicly shared

*SpillageA vendor conducting a pilot program with your organization contacts you for organizational data to use in a prototype. How should you respond?-Provide the requested data using an encrypted channels-Direct the vendor to publicly available data-Refer the vendor to the appropriate personnel-Ask the vendor to sign a confidentiality agreement before providing data

**Classified DataWhen classified data is not in use, how can you protect it?

**Classified DataWhat is required for an individual to access classified data?

**Classified DataWhich classification level is given to information that could reasonably be expected to cause serious damage to national security?

**Classified DataWhich of the following is a good practice to protect classified information?

**Classified DataWhich of the following is true of protecting classified data?

**Classified DataWhat level of damage can the unauthorized disclosure of information classified as Confidential reasonably be expected to cause?

**Classified DataWhich of the following is true about telework?

**Classified DataWhich type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization?

**Classified DataHow should you protect a printed classified document when it is not in use?

**Classified DataWho designates whether information is classified and its classification level?

**Classified DataWhich of the following is a good practice for telework?

**Classified DataWhat is the basis for handling and storage of classified data?-Organizational policy-Security Classification Guides (SCGs)-Classification markings and handling caveats-General Services Administration (GSA) approval

**Classified DataWhat level of damage to national security can you reasonably expect Top Secret information to cause if disclosed?-Damage-Serious Damage-Exceptionally grave damage

**Classified DataWhich of the following is true of protecting classified data?-Classified material must be appropriately marked.-Secure facilities allow open storage of classified material.-Classified material may be used in unsecured areas as long as it remains in the possession of an individual with the proper clearance and need-to-know.

**Insider ThreatBased on the description that follows, how many potential insider threat indicator(s) are displayed? A colleague vacations at the beach every year, is married and a father of four, sometimes has poor work quality, and works well with his team.

**Insider ThreatHow many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display?

**Insider ThreatBased on the description that follows, how many potential insider threat indicator(s) are displayed? A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information.

**Insider ThreatWhat advantages do "insider threats" have over others that allows them to cause damage to their organizations more easily?

**Insider ThreatWhat type of activity or behavior should be reported as a potential insider threat?

**Insider ThreatWhich of the following should be reported as a potential security incident?

**Insider ThreatWhich scenario might indicate a reportable insider threat?

**Insider ThreatWhich scenario might indicate a reportable insider threat?-A supervisor who frequently discusses and debates politics with others in the workplace.-A colleague removes sensitive information without seeking authorization in order to perform authorized telework.-A manager authorized for telwork who works from home for a couple of hours in the evening.-A direct report who demonstrates poor work performance and is consistently late.

**Insider ThreatWhich of the following is a reportable insider threat activity?-Securing a personally owned electric device in a private vehicle-Planning an overseas vacation-Attempting to access sensitive information without need-to-know-Purchasing a high value item after saving for it

**Insider ThreatBased on the description that follows, how many potential insider threat indicator(s) are displayed? A colleague enjoys playing video games online, regularly uses social media, and frequently forgets to secure her smartphone elsewhere before entering areas where it is prohibited.-3 or more indicators-2 indicators-0 indicators-1 indicator

**Insider ThreatBased on the description that follows, how many potential insider threat indicator(s) are displayed? A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion.

**Insider ThreatWhich type of behavior should you report as a potential insider threat?

**Insider ThreatWhich of the following is NOT considered a potential insider threat indicator?

**Insider ThreatWhat function do Insider Threat Programs aim to fulfill?

**Insider ThreatWhich of the following is a potential insider threat indicator?

**Insider ThreatWhich of the following is a potential insider threat indicator?

**Social NetworkingWhen is the safest time to post details of your vacation activities on your social networking profile?

**Social NetworkingWhat should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sites visited?

**Social NetworkingWhich of the following information is a security risk when posted publicly on your social networking profile?

**Social NetworkingWhich of the following is a security best practice when using social networking sites?

**Social NetworkingWhen may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct?

**Social NetworkingWhich of the following is a security best practice when using social networking sites?

**Social NetworkingWhich of the following information is a security risk when posted publicly on your social networking profile?

**Social NetworkingYour cousin posted a link to an article with an incendiary headline on social media. What action should you take?

**Social NetworkingWhich of the following best describes the sources that contribute to your online identity?

**Social NetworkingAs someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project?

**Social Networking-How can you protect your organization on social networking sites?

**Social NetworkingWhen may you be subject to criminal, disciplinary, and/or administrative action due to online harassment, bullying, stalking, hazing, discrimination, or retaliation?

**Social NetworkingWhich of the following statements is true?

**Social NetworkingHow can you protect yourself on social networking sites?-Turn on Global Positioning System (GPS) location geotagging-Connect with people you don't know only if share mutual connections-Delete posts containing personal information on a regular basis-Validate friend request through another source before confirming them

*Controlled Unclassified InformationWhich of the following is NOT an example of CUI?

*Controlled Unclassified InformationWhich of the following is NOT a correct way to protect CUI?

*Controlled Unclassified InformationWhich designation marks information that does not have potential to damage national security?

*Controlled Unclassified InformationWhich of the following is true of Controlled Unclassified Information (CUI)?

*Controlled Unclassified InformationWhich of the following is a security practice for protecting Personally Identifiable Information (PII)?

*Controlled Unclassified InformationWhich of the following is true of Unclassified information?-It is releasable to the public without clearance.-Aggregating it does not affect its sensitivity level.-It could affect the safety of the government personnel, missions, and systems.-It does not require markings or distribution controls.

*Controlled Unclassified InformationWhich of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)?-Debra ensures all recipients have the required clearance and an official need-to-know before sending CUI via encrypted e-mail.-Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI.-John submits CUI to his organization's security office to transmit it on his behalf.-Prudence faxes CUI using an Unclassified cover sheet via a Secret fax machine.

**Physical SecurityWhat is a good practice for physical security?

**Physical SecurityAt which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only?

**Physical SecurityWhich Cyber Protection Condition (CPCON) is the priority focus on critical and essential functions only?

**Physical SecurityWithin a secure area, you see an individual who you do not know and is not wearing a visible badge. What should you do?

**Physical SecurityWhich of the following is a best practice for physical security?

**Physical SecurityWhich of the following best describes good physical security?-Sharon follows her colleague into a secure area without badging in after they have lunch together.-Brenda borrows an access badge from her co-worker when she forgets hers.-Lionel stops an individual in his secure area who is not wearing a badge.-Eal takes home a copy of his secure area's access roster in preparation for telework.

**Identity ManagementYour DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. In which situation below are you permitted to use your PKI token?

**Identity ManagementWhich of the following is the nest description of two-factor authentication?

**Identity management Which is NOT a sufficient way to protect your identity?

**Identity managementWhat is the best way to protect your Common Access Card (CAC)?

**Identity managementWhich of the following is NOT a best practice to preserve the authenticity of your identity?

**Identity managementWhich of the following is an example of two-factor authentication?

**Identity ManagementWhich of the following is true of using a DoD Public Key Infrastructure (PKI) token?

**Identity ManagementWhich of the following is true of the Common Access Card (CAC)?

**Identity managementWhich of the following is an example of a strong password?

**Identity managementWhich of the following is an example of a strong password?-password12345-%2ZN=Ugq-Fido0823Love-Alabam@1968

**Identity managementWhich of the following is an example of two-factor authentication.-A Common Access Card and Personal Identification Number-Photo identification and proof of residence-Physical access and system access-Facial recognition and a fingerprint

*Sensitive Compartmented InformationWhat is Sensitive Compartmented Information (SCI)?

*Sensitive Compartmented InformationWhich of the following best describes the compromise of Sensitive Compartmented Information (SCI)?

*Sensitive Compartmented InformationA compromise of Sensitive Comparmented Information (SCI) occurs when a person who does not have the required clearance or assess caveats comes into possession of SCI _____.-in any manner-verbally-electronically-physically

*Sensitive Compartmented InformationWhen should documents be marked within a Sensitive Compartmented Information Facility (SCIF)

*Sensitive Compartmented InformationWhich must be approved and signed by a cognizant Original Classification Authority (OCA)?

*Sensitive Compartmented InformationWhat must the dissemination of information regarding intelligence sources, methods, or activities follow?

*Sensitive Compartmented InformationWhen is it appropriate to have your security badge visible?

*Sensitive Compartmented InformationWhat should the owner of this printed SCI do differently?

*Sensitive Compartmented InformationWhat should the participants in this conversation involving SCI do differently?

*Sensitive Compartmented InformationWhen faxing Sensitive Compartmented Information (SCI), what actions should you take?

*Sensitive Compartmented InformationWhat action should you take if you become aware that Sensitive Compartmented Information (SCI) has been compromised?

*Sensitive Compartmented InformationWhat guidance is available for marking Sensitive Compartmented Information (SCI)?

*Sensitive Compartmented InformationWhich of the following is true of transmitting Sensitive Compartmented Information (SCI)?

*Sensitive Compartmented InformationWhich of the following is true of Sensitive Compartmented Information (SCI)?

*Sensitive Compartmented InformationWhich of the following is true of sharing information in a Sensitive Compartmented Information Facility (SCIF)-SCIFs universally permit open storage.-Individuals must avoid referencing derivatively classified reports classified higher than the recipient.-All individuals in a SCIF are properly cleared and have need-to-know.-Classified material stored in a SCIF does not require classification markings.

**Removable Media in a SCIFWhat must users ensure when using removable media such as compact disk (CD)?

**Removable Media in a SCIFWhat portable electronic devices (PEDs) are allowed in a Sensitive Compartmented Information Facility (SCIF)?

**Removable Media in a SCIFWhat action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)?

**Removable Media in a SCIFWhich of the following is NOT a potential consequence of using removable media unsafely in a Sensitive Compartmented Information Facility (SCIF)?-Loss of mission-Loss of life-Damage to the removable media-Compromise of information, systems, programs, and/or assets

*Malicious CodeWhat are some examples of malicious code?

*Malicious CodeWhich of the following is NOT a way that malicious code spreads?

*Malicious CodeAfter visiting a website on your Government device, a popup appears on your screen. The popup asks if you want to run an application. Is this safe?

*Malicious CodeWhich of the following is NOT a type of malicious code?

*Malicious CodeWhich of the following is true of downloading apps?-For personally owned devices, download apps from the original developer's site whenever possible.-Official app stores may be trusted to ensure security of apps they provide.-For Government-owned devices, you are responsible for researching any application and its vulnerabilities before downloading it.-For Government-owned devices, use approved and authorized applications only.

**Website UseWhile you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. The website requires a credit card for registration. What should you do?

**Website UseHow should you respond to the theft of your identity?

**Website UseWhich of the following statements is true of cookies?

**Website UseWhich of the following statements is true of cookies?

**Website UseWhich of the following actions can help to protect your identity?-Throw credit card and bank statements in the trash-Share your password only when requested-Shred personal documents-Carry your passport with you

**Social EngineeringWhich is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail?

**Social EngineeringWhat is TRUE of a phishing attack?

**Social EngineeringWhich of the following is a way to protect against social engineering?

**Social EngineeringWhat is whaling?

**Social EngineeringWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)?

**Social EngineeringHow can you protect yourself from internet hoaxes?

**Social EngineeringWhich may be a security issue with compressed Uniform Resource Locators (URLs)?

**Social EngineeringWhat is a common indicator of a phishing attempt?

**Social EngineeringWhat is a common indicator of a phishing attempt?-Up-to-date security certificates-A digital signature-A claim that you must update or validate information-A request to call the number on the back of your credit card

**Social EngineeringWhich of the following is true of internet hoaxes?

**Social EngineeringWhich of the following is true?

**Social EngineeringWhat security issue is associated with compressed Uniform Resource Locators (URLs)?

**Social EngineeringWhat type of social engineering targets particular groups of people?-School phising-Whaling-Group phishing-Spear phishing

**TravelWhat is a best practice while traveling with mobile computing devices?

**TravelWhich of the following is true of traveling overseas with a mobile phone?

**TravelWhat security risk does a public Wi-Fi connection pose?

**TravelWhich of the following is a concern when using your Government-issued laptop in public?

**TravelWhich of the following is true of traveling overseas with a mobile phone?

**Use of GFEWhen can you check personal e-mail on your Government-furnished equipment (GFE)?

**Use of GFEWhat is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)?

**Use of GFEWhich of the following personally-owned computer peripherals is permitted for use with Government-furnished equipment?

**Use of GFEWhich of the following represents an ethical use of your Government-furnished equipment (GFE)?-Checking personal e-mail when allowed by your organization-Placing a bet on Sunday's football game-Running your side business-Downloading a pirated version of a new movie

**Mobile DevicesWhich is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems?

**Mobile DevicesWhat can help to protect the data on your personal mobile device?

**Mobile DevicesWhat should you do when going through an airport security checkpoint with a Government-issued mobile device?

**Mobile DevicesWhen can you use removable media on a Government system?

**Mobile DevicesWhich of the following is an example of removable media?

**Mobile DevicesWhich of the following is an example of removable media?

**Mobile DevicesWhich of the following is a best practice for using removable media?

**Mobile DevicesWhich of the following is NOT a risk associated with near field communication (NFC)?-Eavesdropping-Additional data charges-Data manipulation or corruption-Viruses

**Home Computer SecurityHow can you protect your information when using wireless technology?

**Home Computer SecurityWhat should you consider when using a wireless keyboard with your home computer?

**Home Computer SecurityWhich of the following is a best practice for securing your home computer?

**Home Computer SecurityWhich of the following is a best practice for securing your home computer?-Install system security patches-Disable any pre-installed antivirus osftware-Turn off firewall protection-Use the default logon ID and password for the operating system

**Home Computer SecurityHow should you secure your home wireless network for teleworking?

Which of the following is true of protecting classified data?(CLASSIFIED DATA)
A vendor conducting a pilot program with your organization contacts you for organizational data to use in a prototype. How should you respond?(CLASSIFIED DATA)
When classified data is not in use, how can you protect it?(CLASSIFIED DATA)
What is the basis for handling and storage of classified data?(CLASSIFIED DATA)
Which of the following is a good practice to protect classified information?(CLASSIFIED DATA)
Which of the following must you do before using an unclassified laptop and peripherals in a collateral classified environment?(CLASSIFIED DATA)
What level of damage to national security can you reasonably expect Top secret information to cause if disclosed?(CLASSIFIED DATA)
How should you secure your home wireless network for teleworking?(HOME COMPUTER SECURITY)
Which of the following is true about telework?(HOME COMPUTER SECURITY)
Which of the following is a reportable insider threat activity?(INSIDER THREAT)
Which scenario might indicate a reportable insider threat?(INSIDER THREAT)
Which of the following is a potential insider threat indicator?(INSIDER THREAT)
Based on the description that follows, how many potential insider threat indicator(s) are displayed?A colleague saves money for an overseas vacation every year, is a single father, and occasionally consumes alcohol.(INSIDER THREAT)
Which piece of information is safest to include on your social media profile?(SOCIAL NETWORKING)
Which of the following statements is true?(SOCIAL NETWORKING)
How can you protect your organization on social networking sites?(SOCIAL NETWORKING)
Which designation marks information that does not have potential to damage national security?(CONTROLLED UNCLASSIFIED INFORMATION)
Which of the following is true of Unclassified information?(CONTROLLED UNCLASSIFIED INFORMATION)
Which is a best practice for protecting Controlled Unclassified Information (CUI)?(CONTROLLED UNCLASSIFIED INFORMATION)
Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)?(CONTROLLED UNCLASSIFIED INFORMATION)
Which designation includes Personally Identifiable Information (PII) and Protected Health Information (PHI)?(CONTROLLED UNCLASSIFIED INFORMATION)
Which of the following is NOT an example of CUI?(CONTROLLED UNCLASSIFIED INFORMATION)
Which of the following is NOT a correct way to protect CUI?(CONTROLLED UNCLASSIFIED INFORMATION)
Which of the following best describes good physical security?(PHYSICAL SECURITY)
Which of the following is a best practice for physical security?(PHYSICAL SECURITY)
Which of the following is an example of two-factor authentication?(IDENTITY MANAGEMENT)
What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card?(IDENTITY MANAGEMENT)
Which of the following is true of using a DoD Public Key Infrastructure (PKI) token?(IDENTITY MANAGEMENT)
What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)?(SENSITIVE COMPARTMENTED INFORMATION)
Which of the following is true of Sensitive Compartmented Information (SCI)?(SENSITIVE COMPARTMENTED INFORMATION)
Which of the following is NOT a potential consequence of using removable media unsafely in a Sensitive Compartmented Information Facility (SCIF)?(SENSITIVE COMPARTMENTED INFORMATION)
Which of the following is true of transmitting Sensitive Compartmented Information (SCI)?(SENSITIVE COMPARTMENTED INFORMATION)
A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI _________.(SENSITIVE COMPARTMENTED INFORMATION)
What portable electronic devices (PEDs) are permitted in a SCIF?(REMOVABLE MEDIA IN A SCIF)
How should you label removable media used in a Sensitive Compartmented Information Facility (SCIF)?(REMOVABLE MEDIA IN A SCIF)
What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF?(REMOVABLE MEDIA IN A SCIF)
Which of the following is NOT a type of malicious code?(MALICIOUS CODE)
Which of the following is a way to prevent the spread of malicious code?(MALICIOUS CODE)
Which of the following actions can help to protect your identity?(WEBSITE USE)
Which is an appropriate use of government e-mail?(SOCIAL ENGINEERING)
What type of social engineering targets particular groups of people?(SOCIAL ENGINEERING)
What type of social engineering targets senior officials?(SOCIAL ENGINEERING)
How can you protect yourself from social engineering?(SOCIAL ENGINEERING)
Which of the following is true?(SOCIAL ENGINEERING)
Which of the following is true of traveling overseas with a mobile phone?(TRAVEL)
Which of the following is a concern when using your Government-issued laptop in public?(TRAVEL)
What should Sara do when using publicly available Internet, such as hotel Wi-Fi?(TRAVEL)
What is the danger of using public Wi-Fi connections?(TRAVEL)
Which of the following personally-owned computer peripherals is permitted for use with Government-furnished equipment?(USE OF GFE)
How can you protect data on your mobile computing and portable electronic devices (PEDs)?(MOBILE DEVICES)
Which of the following is NOT a risk associated with near field communication (NFC)?(MOBILE DEVICES)
Which of the following best describes the conditions under which mobile devices and applications can track your location?(MOBILE DEVICES)
Which of the following is an example of removable media?(MOBILE DEVICES)
Which of the following is true of Internet of Things (IoT) devices?
When is it appropriate to have your security badge visible?
What should the owner of this printed SCI do differently?
What should the participants in this conversation involving SCI do differently?
Which of the following demonstrates proper protection of mobile devices?
Which of the following does NOT constitute spillage?(SPILLAGE)
Which of the following is NOT an appropriate way to protect against inadvertent spillage?(SPILLAGE)
Which of the following may help to prevent spillage?(SPILLAGE)
Which of the following should you NOT do if you find classified information on the internet?
Who designates whether information is classified and its classification level?
Which of the following may be helpful to prevent spillage?
Which of the following may be helpful to prevent spillage?
Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization?
What is a good practice to protect classified information?
Based on the description below how many potential insider threat indicators are present? A colleague often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display?
What threat do insiders with authorized access to information or information systems pose?
Which of the following is NOT considered a potential insider threat indicator?
When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct?
When is the safest time to post details of your vacation activities on your social networking profile?
Which of the following is a security best practice when using social networking sites?
Which of the following is NOT an example of CUI?
Which of the following is NOT a correct way to protect CUI?
Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI)
Select the information on the data sheet that is protected health information (PHI)
Within a secure area, you see an individual who you do not know and is not wearing a visible badge
What certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) card contain?
Which of the following is an example of a strong password?
When faxing Sensitive Compartmented Information (SCI), what actions should you take?
When is it appropriate to have your security badge visible within a sensitive compartmented information facility (SCIF)?
What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)?
Which of the following is NOT a way malicious code spreads?
Which of the following statements is true of cookies?
How can you protect yourself from internet hoaxes?
How can you protect yourself from social engineering?
What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)?
Which of the following is a concern when using your Government-issued laptop in public?
What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)?
Which of the following is an example of near field communication (NFC)?
Which of the following is an example of removable media?
Which of the following is a best practice for securing your home computer?
(Spillage) What should you do if a reporter asks you about potentially classified information on the web?
(Spillage) Which of the following is a good practice to aid in preventing spillage?
(Spillage) After reading an online story about a new security project being developed on the military installation whe
No comments found.
Login to post a comment
This item has not received any review yet.
Login to review this item
No Questions / Answers added yet.
Price $5.00
Add To Cart

Buy Now
Category Exams and Certifications
Comments 0
Rating
Sales 0

Buy Our Plan

We have

The latest updated Study Material Bundle with 100% Satisfaction guarantee

Visit Now
{{ userMessage }}
Processing