You can email your employees information to yourself so you can work on it this weekend and go home now. Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? Classified material must be appropriately marked, everything Friends Only except your Name and Profile Picture - turn off "Check in location via GPS", Cyber Awareness Challenge 2022 Knowledge Check, Annual DoD Cyber Awareness Challenge Training, DOD Cyber Awareness Challenge 2019 (DOD-IAA-V, Cyber Awareness Challenge 2023 (Incomplete), Cyber Awareness Challenge 2021 - Knowledge Ch, Elliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson, Information Technology Project Management: Providing Measurable Organizational Value, Operations Management: Sustainability and Supply Chain Management, Service Management: Operations, Strategy, and Information Technology, Unit 2 Industrialization/Immigration - Review. *SpillageA user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. Decline so that you maintain physical contact of your Government-issued laptop. Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? Which of the following is NOT a best practice to protect data on your mobile computing device? They can be fully or partially remote; they may work from a home office, co-working space or other location; and increasingly they may be geographically distant from the organization or clients they serve. 2003-2023 Chegg Inc. All rights reserved. What information most likely presents a security risk on your personal social networking profile? 1, 2010). *MOBILE DEVICES*Which of the following is an example of near field communication (NFC)? Use a single, complex password for your system and application logons. T/F. *INSIDER THREAT*Based on the description below how many potential insider threat indicators are present? For more information, review the Security & IT Guidance. Which of the following is a security best practice when using social networking sites? What should you do? What should you do after you have ended a call from a reporter asking you to confirm potentially classified information found on the web? -If aggregated, the classification of the information may not be changed. Before long she has also purchased shoes from several other websites. A smartphone that transmits credit card payment information when held in proximity to a credit card reader. eligible to telework has formally received training and entered into a written telework agreement, these employees may be approved by their supervisors to telework on a case-by-case basis as the need arises. *Sensitive Compartmented InformationWhich must be approved and signed by a cognizant Original Classification Authority (OCA)? *Sensitive InformationWhich of the following is an example of Protected Health Information (PHI)? **Social NetworkingWhat should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sires visited? Which of the following should be reported as a potential security incident (in accordance with your Agencys insider threat policy)? How many potential insider threat indicators does this employee display? Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. Verified answer question Telework. Your comments are due on Monday. Telework is here to stay, says industrial/organizational (I/O) psychologist Timothy Golden, PhD, professor and area coordinator of enterprise management and organization at, Rensselaer Polytechnic Institute in Troy, New York. *Sensitive InformationWhat is the best example of Personally Identifiable Information (PII)? The Cambridge Handbook of Technology and Employee Behavior, Cambridge University Press 2019, Digital Nomads: The Final Frontier of Work Arrangements? Maria is at home shopping for shoes on Amazon.com. Which type of information includes personal, payroll, medical, and operational information? In the context of work flow design, a position is _____. Study the diagram of the hemispheres on page 20 . Someone calls from an unknown number and says they are from IT and need some information about your computer. In an ongoing effort known as the University of Michigan Coworking Project, a team of researchers has used surveys, interviews and participatory observations to show that such spaces can create a sense of community without threatening remote workers prized autonomy (Garrett, L.E., et al., Organization Studies, Vol. What is the best course of action? Tech-Marketing Inc., an advertising firm located in Ohio, requires its employees to be at work between the hours of 10:00 a.m. to 3:00 p.m. Under DLA policy, a first-line supervisor may be delegated authority to: Approved telework requests. Of course, some jobs are better suited to remote work than others. Which of the following is NOT a correct way to protect CUI? They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. Store it in a General Services Administration (GSA)-approved vault or container Based on the description that follows, how many potetntial insider threat indicator (s) are displayed? What is the best response if you find classified government data on the internet? A telework arrangement is generally difficult to set up for _____. -Remove security badge as you enter a restaurant or retail establishment. -Make note of any identifying information and the website URL and report it to your security office. The future of remote work. New interest in learning another language? 17, No. The information that I provide while filling out this online employment application form and completing the application process, including possibly sensitive data, will be transferred online, stored, and processed on a server in the United States of America. A. A type of phishing targeted at high-level personnel such as senior officials. What should you do to protect yourself while on social networks? They also need to shift their culture and norms to support the new arrangement.. Others are exploring issues of isolation and overwork, how first-time teleworkers adjust to their new circumstances and which types of employees thrive when working remotely. The research has generally shown that for most outcomes, remote work leads to small but tangible benefits, says I/O psychologist Bradford Bell, PhD, professor and director of the Center for Advanced Human Resource Studies (CAHRS) at Cornell University. To secure IoT devices: Examine the default security options available Enable any security features Set a robust password at the device's maximum length, if possible (Correct) -It does not affect the safety of Government missions. . _____ refers to the option given to employees to work away from a centrally located office. DoD employees are prohibited from using a DoD CAC in card-reader-enabled public devices. Which of the following is NOT a way that malicious code spreads? As part of the telework arrangement, be clear about when teleworkers are expected to be completing tasks and when they should be responsive to incoming calls or emails. Chang invests $500\$ 500$500 in an account that earns 3.5%3.5 \%3.5% compounded annually. It can be most beneficial to simplify jobs where _____. Interestingly, the growing popularity of remote work could end up dampening its benefits, suggests research by Gajendran. Telecommuting is a management tool just like any other, Gajendran says. Which of the following is an example ofmalicious code? How many indicators does this employee display? 6, 2017). Which of the following is an example of malicious code? P2P (Peer-to-Peer) software can do the following except: -Allow attackers physical access to network assets. As part of the survey the caller asks for birth date and address. Step 13: Participate in telework and lead by example Managers and supervisors must be committed to using telework to the fullest extent possible if Federal telework programs are to be successful. And such remote work can benefit both employers and employees, experts say. Which of the following is true about telework? degree to which a job requires completing a whole piece of work from beginning to end. -Ask them to verify their name and office number. How can you guard yourself against Identity theft? Issues that should be addressed include: This website uses features which update page content based on user actions. The Federal Government is a leader in the use of innovative workplace arrangements like telework. Connect with others, with spontaneous photos and videos, and random live-streaming. A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. People choose to work remotely to avoid daily commutes, reduce workplace distractions and fulfill family care responsibilities (Owl Labs State of Remote Work, 2017). What should you do? *Sensitive InformationWhat type of unclassified material should always be marked with a special handling caveat? Researchers already know a lot about how to coordinate behavior and motivate people working in face-to-face teams, says Kozlowski. Which of the following is true of telework? Employees also need to cultivate effective routines; set boundaries with managers, colleagues and family members; and make an effort to stay socially and professionally engaged, Jacoby says. And such remote work can benefit both employers and employees, experts say. The state may verify the information. What should be your response? -Directing you to a web site that is real. Ive tried all the answers and it still tells me off, part 2. 22, No. In the 1970's the objective of telecommuting was to avoid traffic, that is, it was closely associated with transportation [32]. In a study of 733 work relationships among colleagues from a variety of industries, she found that relationship quality was more closely tied to perceived proximityor relational closenessthan it was to physical proximity (OLeary, M.B., et al., MIS Quarterly, Vol. Jacoby, K.S., & Holland, S., In The Bridge: Connecting Science and Practice Society for Industrial and Organizational Psychology, Jan. 4, 2019, SIOP White Paper Series: Telecommuting Work with our consultant to learn what to alter. Which of these is true of unclassified data? Along with social isolation, the clouding of work-family boundaries is a significant challenge for remote employees. 2, 2015). When is it appropriate to have your security badge visible? You must have your organization's permission to telework. How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? For example, the EPA confirmed a year-to-year drop of over 30% in pollution levels in San Francisco following the shelter-in-place order. As long as the document is cleared for public release, you may share it outside of DoD. In June 2014, President Obama issued a Presidential Memorandum entitled, Enhancing Workplace Flexibilities and Work-Life Programs, as a way to help attract, empower and retain a talented and productive workforce in the 21st century. A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Our Enterprise Technology Solutions (ETS) IT shop is not just another team in a government agency. -Using NIPRNet tokens on systems of higher classification level. **Home Computer SecurityHow can you protect your information when using wireless technology? You must have permission from your organization. What should the owner of this printed SCI do differently? How many potential insider threat indicators does this employee display? Which of the following is NOT one? Classified material must be appropriately marked. Software that install itself without the user's knowledge. Abrams, Z. When using your government-issued laptop in public environments, with which of the following should you be concerned? Which is an untrue statement about unclassified data? Drawbacks included social and professional isolation, fewer opportunities for information sharing and a blurring of boundaries between work and personal life (Allen, T.D., et al., Psychological Science in the Public Interest, Vol. -Look for a digital signature on the email. How can you protect your information when using wireless technology? However, there doesn't always have to be one correct answer. How many potential insiders threat indicators does this employee display? Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. -Its classification level may rise when aggregated. **Social NetworkingWhen is the safest time to post details of your vacation activities on your social networking website? Which of the following is NOT true concerning a computer labeled SECRET? Which of these is true of unclassified data? The Telework Enhancement Act defines telework or teleworking as a work flexibility arrangement under which an employee performs the duties and responsibilities of such employee's position, and other authorized activities, from an approved worksite other than the location from which the employee would otherwise work. An employee can write reports or articles from a home office, but interpersonally sensitive tasks that may involve nonverbal communicationconducting a quarterly performance review with a subordinate, for exampletend to go more smoothly when handled face to face, says Golden. But more often, studies show, teleworkers professional obligations tend to extend beyond the traditional workday, interrupting family time and preventing teleworkers from ever truly disconnecting. Box 5000 Lawrence, KS 66046-0500 If you are using assistive technology to view web content, please ensure your settings allow for the page content to update after initial load (this is sometimes called "forms mode"). Employers can hire geographically distributed talent and reduce overhead expenses, while employees can gain flexibility, save time, and reduce transportation and some child-care costs. On a NIPRNet system while using it for a PKI-required task. Which of the following is an example of a strong password? *SOCIAL ENGINEERING*How can you protect yourself from social engineering? Store it in a shielded sleeve to avoid chip cloning. A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. *SOCIAL NETWORKING*Which of the following is a security best practice when using social networking sites? The success of an organization's telework program depends on regular, routine use by employees at all levels. Which of the following is NOT a potential insider threat? All agencies must designate a Telework Managing Officer (TMO), who is the agency's primary contact for policy and program questions. You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). Be aware of classification markings and all handling caveats. For analyzing technical skill levels, the best source for job information may be ____, who have vast experience rating a wide range of jobs. But that's generally how we use "which of the following.". Should you always label your removable media? **Classified DataWhich classification level is given to information that could reasonably be expected to cause serious damage to national security? They can be part of a distributed denial-of-service (DDoS) attack. **Identity ManagementWhich of the following is the nest description of two-factor authentication? What should be your response? Greater physical distances can present logistical concerns when tasks require real-time communicationfor instance, during a military operation. Investigate the links actual destination using the preview feature. In the early twentieth century, French psychologists led by Alfred Binet developed the first test for intelligence to be given to French school children for the purpose of a. selecting the most capable to be turned as future leaders. Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Neither confirm or deny the information is classified. You receive an email from a company you have an account with. They are the most difficult to implement for people in managerial or professional jobs. When using your home network to telework, an unsecured IoT device could become an attack vector to any attached government-furnished equipment (GFE). Social Security Number; date and place of birth; mothers maiden name. telework since the formative period of telework in the 1970's, 1980's and early 1990's [31]. **Identity ManagementYour DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. You receive a call on your work phone and you're asked to participate in a phone survey. 6, 2019). If authorized, what can be done on a work computer? Duties. It is getting late on Friday. Alert box notification is currently enabled, please, Official Website of the U.S. Office of Personnel Management, follow this link to enable alert boxes for your session profile, follow this link to disable alert boxes for your session profile, Telework Managing Officers & Coordinators, Virtual Telework Fundamentals Training Courses, Telework and Performance Management Webcast Trainings, Enhancing Workplace Flexibilities and Work-Life Programs. How should you securely transport company information on a removable media? 92, No. Helen Taylor works 10 hours a day for 4 days a week, while her colleagues work 8 hours a day for 5 days a week. 2, 2014), employee engagement (Masuda, A.D., et al., Career Development International, Vol. Which of the following is NOT a typical result from running malicious code? It can offer freedom from office distractions, reduce work-life stress, and provide an alternative workplace arrangement in case of emergencies. TMOs will often work with a Telework Coordinator on the day-to-day operational aspects of telework. Store classified data appropriately in a GSA-approved vault/container. 4, 2014). Employees should maintain frequent contact with their Telework Coordinator to be sure they follow policy and procedures, and for support and assistance should it be needed. Despite the largely positive findings on the benefits of telecommuting, just 7% of American companies offer the option to most or all of their employees, according to recent BLS data. . You will get the details of all company-provided materials room & # x27 ; s cables nearest Canada Personnel management offers online telework training before they can telework shows the technical requirements - Oracle /a >. -Phishing can be an email with a hyperlink as bait. 1 Answer. Examples include but are not limited to the following: 1) an employee has a short-term need **Physical SecurityAt which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? Which of the following is NOT a social engineering tip? Which of the following is NOT an appropriate way to protect against inadvertent spillage? Which of the following is a proper way to secure your CAC/PIV? Employees who telecommute tend to be slightly more satisfied, and their performance tends to be the same or a little higher.. **Insider ThreatWhat type of activity or behavior should be reported as a potential insider threat? Which of the following is NOT a correct way to protect sensitive information? Which of the following represents a good physical security practice? C. PAQ ratings cannot be used to compare dissimilar jobs. Ive tried all the answers and it still tells me off. You check your bank statement and see several debits you did not authorize. To make jobs less repetitive and more interesting. Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. Explain a compensating balance. -Never allow sensitive data on non-Government-issued mobile devices. children or elderly relatives. C. Y is indirectly proportional to X then, Y = k X, where k is a constant. You have reached the office door to exit your controlled area. What is telework? And you can ask questions on the content site through the word "Ask a question" at the . Sending regular mail to: Office of Personnel Management Open Season Processing Center P.O. As teams become more virtual, it may be impossible for a single person to direct an entire project, Kozlowski says. Diffusion Let us complete them for you. In the Job Characteristics Model, task identity is defined as the _____. D. You have reached the office door to exit your controlled area. The process of getting detailed information about jobs is known as _____. How many potential insiders threat . **Insider ThreatA colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Identification, encryption, and digital signature. Which of the following HR activities is similar to analyzing a job that does not yet exist? -It is inherently not a secure technology. **Insider ThreatA colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. Which of the following is the process of getting oxygen from the environment to the tissues of the body? (32)2. CUI may be stored on any password-protected system. It is getting late on Friday. In many cases this is true. An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? In todays global economy, virtual teams can be distributed across different offices or departments in a single organization or they can span time zones, industries and national borders. New interest in learning another language? What can be used to track Maria's web browsing habits? Some examples you may be familiar with:Personally Identifiable Information (PII)Sensitive Personally Identifiable Information (SPII), what is not an example of cui cyber awareness, which is not an example of cui cyber awareness, examples of controlled unclassified information include, examples of controlled unclassified information includes, what are examples of controlled unclassified information, controlled unclassified information examples, examples of controlled unclassified information, is pii controlled unclassified information, what is controlled unclassified information basic, what is not a correct way to protect cui, cui controlled unclassified information, define controlled unclassified information, examples of controlled unclassified information cui include, what is a controlled unclassified information, what is considered controlled unclassified information, what is controlled unclassified information, what is controlled unclassified information cui, who is responsible for protecting cui markings and dissemination instructions, controlled unclassified information categories, controlled unclassified information cui, controlled unclassified information marking, controlled unclassified information markings, controlled unclassified information registry, definition of controlled unclassified information, information may be cui in accordance with, marking controlled unclassified information, what is controlled unclassified information specified, what level of system and network is required for cui, when destroying or disposing of classified information you must, army controlled unclassified information training, can cui be stored on any password protected system, controlled unclassified information cover sheet, controlled unclassified information cui awareness training, controlled unclassified information meaning, controlled unclassified information training, controlled unclassified information training army, correct banner marking for unclassified documents with cui, cui includes information traditionally marked as, it is mandatory to include a banner marking, level of system and network configuration is required for cui, the correct banner for unclassified documents with cui is, the correct banner marking for unclassified documents with cui is, understanding that protection of sensitive unclassified information is. Still, he says, companies that offer telework arrangements strategicallyby making it contingent upon hitting performance targets, for instancemay be able to avoid such pitfalls. Physical security of mobile phones carried overseas is not a major issue. On a NIPRNet system while using it for a PKI-required task. -Setting weekly time for virus scan when you are not on the computer and it is powered off. Cyber Awareness Challenge Complete Questions and Answers. Which of the following is true about telework? Bob, a coworker, has been going through a divorce, has financial difficulties and is displaying hostile behavior. Which of the following is an important managing-by-results guideline to implement Praise in public, criticize in private Developing a structured work plan includes All of the above All of the following are important pieces of a communication plan EXCEPT Of-site meetings that a teleworker would attend in person All of the following are reminders about telework agreements EXCEPT Should not be .