You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). How many potential insider threat indicators does this employee display? Which of the following is NOT a correct way to protect sensitive information? Software that install itself without the user's knowledge. Level I Antiterrorism Awareness Training - (2, Cyber Awareness Challenge 2022 Knowledge Check, John David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine, Operations Management: Sustainability and Supply Chain Management, Organizational Behavior: Managing People and Organizations, Jean Phillips, Ricky W. Griffin, Stanley Gully, Patient Care - Infection Control & management. A) The U.S. workforce is becoming older, and younger workers are more educated B) The U.S. workforce is becoming younger, and younger workers are more educated C) The U.S. workforce is becoming younger, and older workers are more educated Along with social isolation, the clouding of work-family boundaries is a significant challenge for remote employees. Its not so much that telecommuting is good or bad; its just that sometimes its advantageous and sometimes its not, Gajendran says. Based on the description that follows, how many potetntial insider threat indicator(s) are displayed? Use the classified network for all work, including unclassified work. There are many travel tips for mobile computing. Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. What should you do to protect yourself while on social networks? Jacoby, K.S., & Holland, S., In The Bridge: Connecting Science and Practice Society for Industrial and Organizational Psychology, Jan. 4, 2019, SIOP White Paper Series: Telecommuting A results-oriented performance culture system focuses on having a diverse, results-oriented, high-performing workforce, as well as a performance management system that effectively plans, monitors, develops, rates, and rewards employee performance. Which of the following is NOT an example of CUI? They play an important role in interviews and selection decisions. He lets the staff decide whether to issue refunds or replace merchandise in case of consumer grievances. Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. Which of the following is NOT one? Still, he says, companies that offer telework arrangements strategicallyby making it contingent upon hitting performance targets, for instancemay be able to avoid such pitfalls. A coworker brings a personal electronic device into prohibited areas. **Insider ThreatHow many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? For some, operating from a co-working spacea shared office that provides telecommuters and freelancers with internet access, meeting rooms and other amenitiescan help address social isolation. You must have your organizations permission to telework. You are having lunch at a local restaurant outside the installation, and you find a cd labeled "favorite song". **Social EngineeringWhich of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? *MOBILE DEVICES*Which of the following is an example of near field communication (NFC)? In most organizations, telecommuting is not a right; its a privilege that you earn. As long as the document is cleared for public release, you may release it outside of DoD. Use only your personal contact information when establishing your account, Understanding and using the available privacy settings. What action should you take first? **Insider ThreatA colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. -Never allow sensitive data on non-Government-issued mobile devices. You have reached the office door to exit your controlled area. Which method would be the BEST way to . Have your permissions from your organization, follow your organization guideline, use authorized equipment and software, employ cyber security best practice, perform telework in dedicated when home. Note any identifying information and the website's Uniform Resource Loctaor (URL). C. Telecommuting supports the strategy of corporate social responsibility by reducingthe employee's need to commute by vehicles. ~A coworker brings a personal electronic device into a prohibited area. Some early adoptersincluding Best Buy, IBM and Yahooare even reversing policies that once allowed employees to telecommute, citing leadership changes and a growing need for creative collaboration. What should be done to sensitive data on laptops and other mobile computing devices? What should you do? A limitation in using the PAQ is that it _____. Which of following is true of protecting classified data? Helen Taylor works 10 hours a day for 4 days a week, while her colleagues work 8 hours a day for 5 days a week. Of the following, which is NOT a method to protect sensitive information? Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you. In a study of 273 teleworkers from sales, marketing, accounting, engineering and other departments at one organization, Gajendran and Golden found that employees whose jobs were highly complex but did not require significant collaboration or social support performed better when telecommuting than when working in the companys office (Journal of Business and Psychology, Vol. asked May 31, 2022 in Other by Kamal (64.9k points) Which of the following is true about telework? a. which store are the prices based on). Let us have a look at your work and suggest how to improve it! Ive tried all the answers and it still tells me off, part 2. Which type of information includes personal, payroll, medical, and operational information? (b) Explain the rationale for the use of the lower-of . Which of the following is an important managing-by-results guideline to implement Praise in public, criticize in private Developing a structured work plan includes All of the above All of the following are important pieces of a communication plan EXCEPT Of-site meetings that a teleworker would attend in person All of the following are reminders about telework agreements EXCEPT Should not be . -Looking for "https" in the URL. A 2013 Gallup poll found that teleworkers log an extra four hours per week on average compared with their counterparts in the office. Connect with others, with spontaneous photos and videos, and random live-streaming. Be aware of classification markings and all handling caveats. But that's generally how we use "which of the following.". When checking in at the airline counter for a business trip. Call your security point of contact immediately. softw are Question Not yet answered Marked out of 1.00 Flag question Question text Cell phones, BlackBerrys, iPhones, e-mail, and online conferencing over the Internet have . Job enrichment differs from job rotation in that job enrichment: empowers workers by adding more decision-making authority to their jobs. When leaving your work area, what is the first thing you should do? **Insider ThreatWhich of the following should be reported as a potential security incident? 17, No. A good telework arrangement starts with a good self-assessment. Which of the following attacks target high ranking officials and executives? _____ refers to the option given to employees to work away from a centrally located office. The Telework Enhancement Act defines telework or teleworking as a work flexibility arrangement under which an employee performs the duties and responsibilities of such employee's position, and other authorized activities, from an approved worksite other than the location from which the employee would otherwise work. What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web? You have reached the office door to exit your controlled area. He found that when telecommuting is less common at a company, employees tend to perform best when they work primarily remotely. Employees should consider the following factors in making an honest determination about their telework capabilities: Additionally, to be a successful teleworker you need to have work habits that support independent task performance. In terms of the Job Characteristics Model, feedback refers to the extent to which _____. -Ask them to verify their name and office number. To secure IoT devices: Examine the default security options available Enable any security features Set a robust password at the device's maximum length, if possible New interest in learning a foregin language. Which of the following is NOT a typical result from running malicious code? Report the crime to local law enforcement. In the case of emergency telework, what should I have available at all times at my home office that would enable me to be functional without coming onsite to retrieve materials. Required. Telework can give employees more control over their schedules and flexibility in meeting personal and professional responsibilities. *Sensitive InformationWhich of the following is an example of Protected Health Information (PHI)? What is NOT Personally Identifiable Information (PII)? Classified material must be appropriately marked. Preferred formal educational background in one of the following: Business Administration, Project Management, Information Systems Management, National Security Studies, Computer Science, or . *SOCIAL ENGINEERING*How can you protect yourself from social engineering? What should the participants in this conversation involving SCI do differently? What actions should you take prior to leaving the work environment and going to lunch? Which of the following is an example of a strong password? Which of the following job design techniques does Carl implement in his store? *SpillageAfter reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Get a Consultant. Telework Management was developed to follow our passion and dedicate time to developing others using our expertise in remote leadership and people development. Which of the following is NOT an example of sensitive information? Which is a risk associated with removable media? This work rule allows employees to work additional hours before or after the time period in order to work the full day. As long as the document is cleared for public release, you may share it outside of DoD. -Setting weekly time for virus scan when you are not on the computer and it is powered off. *Sensitive InformationUnder which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? A pop-up window that flashes and warns that your computer is infected with a virus. Its time for organizations to move beyond seeing it as a family-friendly work arrangement. All the . children or elderly relatives. -You must have your organization's permission to telework. A. . You must have your organization's permission to telework. Which of the following should be reported as a potential security incident? What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? Never allow sensitive data on non-Government-issued mobile devices. Back to top What information posted publicly on your personal social networking profile represents a security risk? A manager of a revenue center is responsible for all of the following EXCEPT a. service quality and units sold. D. Y is indirectly proportional to X then, Y = k X, where k is a variable. \. New interest in learning another language? **Use of GFEUnder what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? Even within a specific role, some duties may be well suited to teleworking, while others are better performed in person. *SOCIAL ENGINEERING*How can you protect yourself from internet hoaxes? They are the most difficult to implement for people in managerial or professional jobs. C. Y is indirectly proportional to X then, Y = k X, where k is a constant. Which of the following is true about telework? (23)2\left(\frac{2}{3}\right)^{-2} You know this project is classified. What is considered a mobile computing device and therefore shouldn't be plugged in to your Government computer? On a NIPRNET system while using it for a PKI-required task. Someone calls from an unknown number and says they are from IT and need some information about your computer. Issues that should be addressed include: This website uses features which update page content based on user actions. As part of the telework arrangement, be clear about when teleworkers are expected to be completing tasks and when they should be responsive to incoming calls or emails. Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Jane JonesSocial security number: 123-45-6789, Select the information on the data sheet that is protected health information (PHI). Which of the following is NOT an example of CUI? Despite the largely positive findings on the benefits of telecommuting, just 7% of American companies offer the option to most or all of their employees, according to recent BLS data. You are logged on to your unclassified computer and just received an encrypted email from a co-worker. Which of the following is not a step in the process of measuring external transactions? All https sites are legitimate. b. identifying those who might be wasting their talents and not taking school seriously. identify the correct and incorrect statements about executive orders. It can be most beneficial to simplify jobs where _____. Always use DoD PKI tokens within their designated classification level. Which of the following does NOT constitute spillage? Which of the following is NOT a security best practice when saving cookies to a hard drive? After clicking on a link on a website, a box pops up and asks if you want to run an application. SSN, date and place of birth, mothers maiden name, biometric records, PHI, passport number, Subset of PII, health information that identifies the individual, relates to physical or mental health of an individual, provision of health care to an individual, or payment of healthcare for individual. *MOBILE DEVICES*Which of the following is an example of removable media? What is a best practice to protect data on your mobile computing device? What type of attack might this be? To make jobs less repetitive and more interesting. -Request the user's full name and phone number. 0 votes . What describes how Sensitive Compartmented Information is marked? Answer The answer will depend largely on the requirements of your individual agency, the agency telework policy, and your manager. Examples are: Patient names, Social Security numbers, Drivers license numbers, insurance details, and birth dates. On the one hand, family and social obligations can easily bleed over into work hours. **Social EngineeringWhat is TRUE of a phishing attack? 6, 2007). Which of the following actions is appropriate after finding classified information on the Internet? *SpillageWhat is a proper response if spillage occurs? **Classified DataWhen classified data is not in use, how can you protect it? The strength of Answer computing and the growth of the mobile digital platform allow organizations to rely more on telework, remote work, and distributed decision making. Remote work (or working remotely) is often considered to be an arrangement where employers require workers to work somewhere other than at the designated worksite because of temporary unforeseeable circumstances, such as pandemics, states of emergency, or inclement weather. *Sensitive Compartmented InformationWhich of the following best describes the compromise of Sensitive Compartmented Information (SCI)? Which of the following is NOT a criterion used to grant an individual access to classified data? Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. whether the employee is expected to work during agency closures or other Continuity of Operations (COOP) related emergencies or situations that may result in a disruption to normal office operations). Malicious code can do the following except? Compute the balances in both accounts after 101010 and 303030 years. Which of the following is true of telework arrangements? Supervisory Position: -Validate all friend requests through another source before confirming them. Verified answer question *SpillageWhat should you do if a reporter asks you about potentially classified information on the web? Verified answer. Which of the following is an example of malicious code? What should be your response? weegy. Which of the following is an invalid guideline for securing telework computers and laptops , per the National Institute of Standards and Technology ( NIST ) Special Publication ( SP ) 800-114 ? A telework arrangement is generally difficult to set up for _____. -As a best practice, labeling all classified removable media and considering all unlabeled removable media as unclassified. Which of the following is true about telework? But a handful of organizations are effectively using research insights to build evidence-based remote work programsand reaping the rewards. Step 13: Participate in telework and lead by example Managers and supervisors must be committed to using telework to the fullest extent possible if Federal telework programs are to be successful. A. Which of the following is NOT a typical means for spreading malicious code? Which of the following is true about knowledge, skills, abilities, and other characteristics (KSAOs) that are required for a job? What should you do? Which of the following is a true statement? What type of data must be handled and stored properly based on classification markings and handling caveats? Teleworkers operating from a home office lack the physical and psychological separation between these two domains that exists in a traditional office setting, says Golden. Accounting is "an information system that identifies, records, and communicates the economic events of an organization to interested users." Instructions Categorize the accounting tasks performed by Genesis as relating to either the identification (I), recording (R), or communication (C) aspects of accounting. 38, No. A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. * CLASSIFIED DATA*Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? As our readers might expect, new guidance from the Department of Labor and recent . The email states your account has been compromised and you are invited to click on the link in order to reset your password. -Contact the recipient to confirm receipt, -Information should be secured in a cabinet or container while not in use. What should you do? *SOCIAL ENGINEERING*What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? A man you do not know is trying to look at your Government-issued phone and has asked to use it. If your wireless device is improperly configured someone could gain control of the device? How does verbalizing an attitude make it more likely that the attitude will guide your behavior? (Ed.) Which of the following is a good practice to avoid email viruses? You are leaving the building where you work. Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? What does Personally Identifiable Information (PII) include? Spillage because classified data was moved to a lower classification level system without authorization. D. Disabling cookies. When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. Investigate the links actual destination using the preview feature. Which of the following is NOT true concerning a computer labeled SECRET? What should you do if someone asks to use your government issued mobile device (phone/laptop..etc)? The research has generally shown that for most outcomes, remote work leads to small but tangible benefits, says I/O psychologist Bradford Bell, PhD, professor and director of the Center for Advanced Human Resource Studies (CAHRS) at Cornell University. And you can ask questions on the content site through the word "Ask a question" at the . A type of phishing targeted at high-level personnel such as senior officials. Health-care company Aetna, for example, has a decade-old remote work program that screens, trains and supports teleworkersa group that now makes up around half of the companys workforce. *CLASSIFIED DATA*What is a good practice to protect classified information? Which of the following is true of telework? What is the best response if you find classified government data on the internet? As researchers and managers practicing in the field, what we need to understand more fully is not if, but how, teleworking is best conducted to maximize work outputs.. Those workers tend to be older, more educated, full time and nonunion. The advertisement exclusively highlights requirements such as strong communication skills, excellent teamwork, and leadership skills. Upon connecting your Government- issued laptop to a public wireless connection, what should you immediately do? But the impact of such arrangements on productivity, creativity and morale has been up for debate, primarily because working from home offers employees fewer opportunities to talk and network with their colleagues.