In addition, many agencies offer their own training as part of their telework policy and procedures. What type of attack might this be? 17, No. -Assuming open storage is always authorized in a secure facility, -Telework is only authorized for unclassified and confidential information, -Taking classified documents from your workspace. While planning, employees shouldconsider the following questions: Although managers are ultimately responsible for the healthy functioning of the workgroup, teleworkers must help manage the group's expectations and their own communication in order to avoid any negative impact on the morale or productivity of non-teleworkers. New interest in learning another language? The parameters of this agreement are most often laid out by the agency policy and/or collective bargaining agreement but should include the following key elements: The manager and teleworker should work together to periodically evaluate the arrangement, make changes to the agreement as necessary, and re-sign the document. What action should you take? Be aware of classification markings and all handling caveats. **Identity managementWhich is NOT a sufficient way to protect your identity? The way teams are configuredthe number and distribution of members and sitesalso matters. Which of these is true of unclassified data? How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? But more often, studies show, teleworkers professional obligations tend to extend beyond the traditional workday, interrupting family time and preventing teleworkers from ever truly disconnecting. *Sensitive InformationWhich of the following is the best example of Personally Identifiable Information (PII)? Which of the following is NOT an example of sensitive information? Work with our consultant to learn what to alter. A smartphone that transmits credit card payment information when held in proximity to a credit card reader. Neither confirm or deny the information is classified. How many potential insider threat indicators is Bob displaying? (Ed.) c. Post the transaction to the T-account in the general ledger. Fell free get in touch with us via phone or send us a message. They can be fully or partially remote; they may work from a home office, co-working space or other location; and increasingly they may be geographically distant from the organization or clients they serve. Supervisory Position: -TRUE The use of webmail is -is only allowed if the organization permits it Using webmail may bypass built in security features. What should you do? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. **Insider ThreatWhich of the following should be reported as a potential security incident (in accordance with you Agencys insider threat policy)? Which of the following is true of telework? Which of following is true of protecting classified data? Which of the following is NOT an example of CUI? He lets the staff decide whether to issue refunds or replace merchandise in case of consumer grievances. Our Enterprise Technology Solutions (ETS) IT shop is not just another team in a government agency. A coworker removes sensitive information without authorization. B. Y is directly proportional to X then, Y = k X, where k is a variable. In todays global economy, virtual teams can be distributed across different offices or departments in a single organization or they can span time zones, industries and national borders. **Home Computer SecurityHow can you protect your information when using wireless technology? Golden affirms that coworking spaces may alleviate social isolation, but its unclear whether they address the professional isolation that out-of-office employees tend to experience, he says. 2, 2015). Additionally, if you are using assistive technology and would like to be notified of items via alert boxes, please, This website uses features which update page content based on user actions. What information relates to the physical or mental health of an individual? (2019, October 1). If your wireless device is improperly configured someone could gain control of the device? Employees whose jobs require concentration or significant problem-solving often need focused time to think deeply about the task at hand, Golden says. How should you protect a printed classified document when it is not in use? A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. Teleworkers also appear to work more. Which of the following job analysis methods requires subject-matter experts to evaluate a job in terms of abilities required to perform the job? Immediately notify your security point of contact. A. A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Which of the following is a security best practice when using social networking sites? Answers: Apples, pears, oranges, bananas. -If possible, set your browser preferences to prompt you each time a website wants to store a cookie. Classified material must be appropriately marked, everything Friends Only except your Name and Profile Picture - turn off "Check in location via GPS", Cyber Awareness Challenge 2022 Knowledge Check, Annual DoD Cyber Awareness Challenge Training, DOD Cyber Awareness Challenge 2019 (DOD-IAA-V, Cyber Awareness Challenge 2023 (Incomplete), Cyber Awareness Challenge 2021 - Knowledge Ch, Elliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson, Information Technology Project Management: Providing Measurable Organizational Value, Operations Management: Sustainability and Supply Chain Management, Service Management: Operations, Strategy, and Information Technology, Unit 2 Industrialization/Immigration - Review. Your PIN should be kept secure at all times, just like your Social Security Number. Label all files, removable media, and subject headers with appropriate classification markings. The success of an organization's telework program depends on regular, routine use by employees at all levels. Which is NOT a way to protect removable media? Malicious code can do the following except? A coworker has asked if you want to download a programmer's game to play at work. Which is a way to protect against phishing attacks? Which of the following is the process of getting oxygen from the environment to the tissues of the body? Which of the following is a practice that helps to protect you from identity theft? -Sanitized information gathered from personnel records. Ask for information about the website, including the URL. Employers can hire geographically distributed talent and reduce overhead expenses, while employees can gain flexibility, save time, and reduce transportation and some child-care costs. Which of the following is true about knowledge, skills, abilities, and other characteristics (KSAOs) that are required for a job? The company has collaborated with psychologists at Cornell University, including Bell, to proactively address issues such as employee isolation, and has seen rewards including reduced real estate costs and better talent retention. 3, 2014). Alert box notification is currently enabled, please, Official Website of the U.S. Office of Personnel Management, follow this link to enable alert boxes for your session profile, follow this link to disable alert boxes for your session profile, Telework Managing Officers & Coordinators, Virtual Telework Fundamentals Training Courses, Telework and Performance Management Webcast Trainings, Enhancing Workplace Flexibilities and Work-Life Programs. It can offer freedom from office distractions, reduce work-life stress, and provide an alternative workplace arrangement in case of emergencies. What is the best choice to describe what has occurred? One can be at the same time appreciative of the need to include what to do under a threat of violence in employee training and viscerally opposed to the kind of active shooter drills that are currently en vogue. Use a common password for all your system and application logons. In another line of research, psychologists are exploring how to maximize the efficiency and productivity of teams that are geographically dispersed. You have reached the office door to exit your controlled area. -Remove security badge as you enter a restaurant or retail establishment. Verified answer question Which of the following is a true statement? A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. 92, No. Which of the following should you do immediately? A 2013 Gallup poll found that teleworkers log an extra four hours per week on average compared with their counterparts in the office. The website requires a credit card for registration. *MALICIOUS CODE*Which of the following is NOT a way malicious code spreads? According to Herzbergs two-factor theory, which of the following factors would motivate individuals the most? You receive an unexpected email from a friend: I think youll like this: https://tinyurl.com/2fcbvy. What action should you take? Its not so much that telecommuting is good or bad; its just that sometimes its advantageous and sometimes its not, Gajendran says. Which of the following is true of the International Organization for Standardization? What should you do? Which of the following job design techniques does Carl implement in his store? Someone calls from an unknown number and says they are from IT and need some information about your computer. children or elderly relatives. Home Flashcards DOD Cyber Awareness Challenge 2019. What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited? You must have permission from your organization. You will get the details of all company-provided materials room & # x27 ; s cables nearest Canada Personnel management offers online telework training before they can telework shows the technical requirements - Oracle /a >. 38, No. T/F. On a NIPRNET system while using it for a PKI-required task. **Classified DataWhen classified data is not in use, how can you protect it? Call your security point of contact immediately. You must have your organizations permission to telework. New interest in learning a foregin language. But experts say that without firmer boundaries, employees can experience exhaustion and burnout and that such overwork should be discouraged by managers and organizations. You have reached the office door to exit your controlled area. He found that when telecommuting is less common at a company, employees tend to perform best when they work primarily remotely. But a handful of organizations are effectively using research insights to build evidence-based remote work programsand reaping the rewards. If authorized, what can be done on a work computer? Of the following, which is NOT a characteristic of a phishing attempt? **Social EngineeringWhat is TRUE of a phishing attack? But if everybody is getting it, people may value it less, Gajendran says. -Phishing can be an email with a hyperlink as bait. As detailed in the Act, all agencies must have a telework policy. You DoD Common Access Card has a Public Key Infrastructure (PKI) token approved fro access to the Non-classified Internet Protocol Router Network (NIPRNet). Which of the following is a good practice to avoid email viruses? -Look for a digital signature on the email. Of the following, which is NOT an intelligence community mandate for passwords? Telecommuting is a management tool just like any other, Gajendran says. A coworker uses a personal electronic device in a secure area where their use is prohibited. Which of the following is true about telework? What is NOT Personally Identifiable Information (PII)? It can be most beneficial to simplify jobs where _____. asked May 31, 2022 in Other by Kamal (64.9k points) Which of the following is true about telework? Those workers tend to be older, more educated, full time and nonunion. You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). Employees should familiarize themselves with their agency's policy and any relevant procedures and collective bargaining agreements to ensure they are in compliance with their requirements. But the onus for making remote work a success does not fall solely on employers. You must possess security clearance eligibility to telework. [ 8.3.3 - Identify threats and attacks to an acquisition program life cycle . A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. What type of data must be handled and stored properly based on classification markings and handling caveats? What action is recommended when somebody calls you to inquire about your work environment or specific account information? B. PAQ reports provide concrete recommendations useful for writing job descriptions or redesigning jobs. Using webmail may bypass built in security features. -Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. You are working at your unclassified system and receive an email from a coworker containing a classified attachment. UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. In many cases, employees will need to plan for their telework days in order to be as effective as possible. -When using a public device with a card reader, only use your DoD CAC to access unclassified information, Thumb drives, memory sticks, and flash drives are examples of. 34, No. In most organizations, telecommuting is not a right; its a privilege that you earn. Which of the following is true? When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. When teleworking, you should always use authorized and software. You can find your Telework Coordinator by searching OPM's Telework Contact Tool. **Classified DataWhat is required for an individual to access classified data? -It must be released to the public immediately. Which of the following is NOT a correct way to protect CUI? People choose to work remotely to avoid daily commutes, reduce workplace distractions and fulfill family care responsibilities (Owl Labs State of Remote Work, 2017). What should be your response? Geotagging posts using Global Positioning System (GPS) or location links Accepting all information posted by your network as true ~Understanding and using the available privacy settings Connecting with people who share mutual connections with you, even if you don't know them **Social Networking The CAC/PIV is a controlled item and contains certificates for: Classified Information can only be accessed by individuals with, -Assigned a classification level by a supervisor. In an ongoing effort known as the University of Michigan Coworking Project, a team of researchers has used surveys, interviews and participatory observations to show that such spaces can create a sense of community without threatening remote workers prized autonomy (Garrett, L.E., et al., Organization Studies, Vol. Let us have a look at your work and suggest how to improve it! C. They support the strategy of corporate social responsibility by reducing an employee's need to commute using a vehicle. -After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. Teams with a strong group identityfor instance, those that have unified against a competing team or organizationtend to have more perceived proximity, Wilson says. What should you do? Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. What should you do? As teams become more virtual, it may be impossible for a single person to direct an entire project, Kozlowski says. Study the diagram of the hemispheres on page 20 . -Senior government personnel, military or civilian. Of the following, which is NOT a security awareness tip? Based on the description that follows, how many potetntial insider threat indicator(s) are displayed?