c. testing whether French teachers merited higher pay. **Classified DataWhich classification level is given to information that could reasonably be expected to cause serious damage to national security? What type of attack might this be? Which of the following is NOT a correct way to protect CUI? When is it appropriate to have your security badge visible? Ive tried all the answers and it still tells me off, part 2. More than 26 million Americansabout 16% of the total workforcenow work remotely at least part of the time, according to the U.S. Bureau of Labor Statistics (BLS). Which of the following is NOT a correct way to protect CUI? Its time for organizations to move beyond seeing it as a family-friendly work arrangement. Linda encrypts all of the sensitive data on her government-issued mobile devices. On a NIPRNET system while using it for a PKI-required task. Which of the following is true? the details of pay and benefits attached to the job. Which of the following is NOT Protected Health Information (PHI)? It is getting late on Friday. What files or other documents will I need to take with me when I leave my regular workplace the day before teleworking? Step 1: Know your Telework Managing Officer and Telework Coordinator All agencies must designate a Telework Managing Officer (TMO), who is the agency's primary contact for policy and program questions. 62, No. What is telework? The advertisement exclusively highlights requirements such as strong communication skills, excellent teamwork, and leadership skills. 16, No. But the impact of such arrangements on productivity, creativity and morale has been . Health-care company Aetna, for example, has a decade-old remote work program that screens, trains and supports teleworkersa group that now makes up around half of the companys workforce. Verified answer. Annual DoD Cyber Awareness Challenge Training - Subjecto.com You are working at your unclassified system and receive an email from a coworker containing a classified attachment. What should be done to sensitive data on laptops and other mobile computing devices? Telework Basics - Telework.gov You believe that you are a victim of identity theft. . Which of the following is true about knowledge, skills, abilities, and other characteristics (KSAOs) that are required for a job? Qualified Offerors must upload the following (4) documents in ERA (Do not upload more documents) or their offers will not be considered for this position: 1. *HOME COMPUTER SECURITY*Which of the following is a best practice for securing your home computer? Which of the following best describes the sources that contribute to your online identity? Upon connecting your Government- issued laptop to a public wireless connection, what should you immediately do? Ask the individual to see an identification badge. results in abstract reports that are of limited use. How many potential insider threat indicators does this employee display? Telework helps make great places In 1964, science fiction writer Arthur C. Clarke predicted that doctors on one continent would one day operate on a patient on another continent, but missed the. Which of the following refers to a list of the tasks, duties, and responsibilities that a job entails? B. Mak, S., & Kozlowski, S.W.J., In Landers, R.N. **Mobile DevicesWhich of the following helps protect data on your personal mobile devices? -Setting weekly time for virus scan when you are not on the computer and it is powered off. However, there doesn't always have to be one correct answer. Which of the following is true of telework? On the one hand, family and social obligations can easily bleed over into work hours. Since the URL does not start with https, do not provide you credit card information. Note any identifying information and the website's Uniform Resource Loctaor (URL). What is the result of an organization structure that is strongly based on function? which of the following is true of telework - the Solution What should you do if someone asks to use your government issued mobile device (phone/laptop..etc)? which of the following is true of telework New interest in learning another language? It is a worldwide federation of national standards bodies from 161 countries The OLPC XO-4 runs a Windows-based operating system FALSE A successful defense against a product liability case is typically expensive in terms of legal fees TRUE In a survey his team conducted, nearly all companies interviewed said they intend to continue offering teleworking or expand its use in the future (Workplace Redesign: Current Trends, Challenges, and Opportunities, CAHRS White Paper, 2019). What should be done to protect against insider threats? Additionally, if you are using assistive technology and would like to be notified of items via alert boxes, please, This website uses features which update page content based on user actions. Which of the following is NOT considered a potential insider threat indicator? "Which Of The Following" - Complete Usage Guide (+Examples) - Grammarhow identify the correct and incorrect statements about executive orders. . And you can ask questions on the content site through the word "Ask a question" at the . Which of the following is a best practice for physical security? A coworker uses a personal electronic device in a secure area where their use is prohibited. Which of the following should you do immediately? D. Y is indirectly proportional to X then, Y = k X, where k is a variable. (a) (1) Determine the proper balance in the Allowance to Reduce Inventory to Market at May 31, 2012. Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. New interest in learning another language? CUI may be stored on any password-protected system. A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. If you are using assistive technology to view web content, please ensure your settings allow for the page content to update after initial load (this is sometimes called "forms mode"). Only allow mobile code to run from your organization or your organizations trusted sites. Which of the following is NOT a DoD special requirement for tokens? He lets the staff decide whether to issue refunds or replace merchandise in case of consumer grievances. **Website UseWhile you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. Within a secure area, you see an individual you do not know. What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? DOD Cyber Awareness Challenge 2019 (DOD-IAA-V16.0) No. For some, operating from a co-working spacea shared office that provides telecommuters and freelancers with internet access, meeting rooms and other amenitiescan help address social isolation. HIRING PREFERENCE SELECTION PROCESS: Applicants in the following hiring preference categories are extended a hiring preference in the . Which is NOT a wireless security practice? In which hemispheres is Africa located? Often, managers use busyness, working late or other proxies to infer that an employee is effective, says Jeanne Wilson, PhD, a professor of organizational behavior at the College of William & Mary in Williamsburg, Virginia. A coworker has asked if you want to download a programmers game to play at work. *INSIDER THREAT*What threat do insiders with authorized access to information or information systems pose? Which of the following should be done to keep your home computer secure? You must have your organization's permission to telework. Which is NOT a method of protecting classified data? Physical security of mobile phones carried overseas is not a major issue. C. Telecommuting supports the strategy of corporate social responsibility by reducingthe employee's need to commute by vehicles. What should you do? Your comments are due on Monday. 6, 2007). When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. WINDOWPANE is the live-streaming app for sharing your life as it happens, without filters, editing, or anything fake. *Sensitive Compartmented InformationWhen should documents be marked within a Sensitive Compartmented Information Facility (SCIF), ~All documents should be appropriately marked, regardless of format, sensitivity, or classification.Unclassified documents do not need to be marked as a SCIF.Only paper documents that are in open storage need to be marked.Only documents that are classified Secret, Top Secret, or SCI require marking. **Identity managementWhat is the best way to protect your Common Access Card (CAC)? Drawbacks included social and professional isolation, fewer opportunities for information sharing and a blurring of boundaries between work and personal life (Allen, T.D., et al., Psychological Science in the Public Interest, Vol. Specifically, we focus on leaders who manage team members based in remote sites and/or telework one or more days each week. You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. The parameters of this agreement are most often laid out by the agency policy and/or collective bargaining agreement but should include the following key elements: The manager and teleworker should work together to periodically evaluate the arrangement, make changes to the agreement as necessary, and re-sign the document. Which of the following is true about telework? **Mobile DevicesWhich is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Which of the following is a security best practice when using social networking sites? In a shared office full of potential interruptions, that can be hard to do.. Some employees work from home a few days a month, some a few days a week and some full timeand the extent of a workers telecommuting can dictate his or her experience. Discuss the difference. *IDENTITY MANAGEMENT*What certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) card contain? Knowledge workers such as computer programmers who can do most of their work on a laptoptasks like creating software code, reports or spreadsheetsand people whose productivity is easily monitored, such as insurance claims adjusters or call center workers, are the most likely to telecommute, says Ravi Gajendran, PhD, assistant professor in the department of global leadership and management at Florida International University. Cyber Awareness Challenge 2021 Flashcards | Quizlet includes a one-time $200 Amazon allowance for ordering at-home office equipment or preferred supplies to support the telework experience. If aggregated, the information could become classified. In a study of 733 work relationships among colleagues from a variety of industries, she found that relationship quality was more closely tied to perceived proximityor relational closenessthan it was to physical proximity (OLeary, M.B., et al., MIS Quarterly, Vol. Spear Phishing attacks commonly attempt to impersonate email from trusted entities. -Phishing can be an email with a hyperlink as bait. Chap 4 Flashcards | Chegg.com If authorized, what can be done on a work computer? UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. Corporate Transparency Act and Beneficial Ownership Information It is getting late on Friday. Use the classified network for all work, including unclassified work. On a NIPRNet system while using it for a PKI-required task. *SOCIAL ENGINEERING*How can you protect yourself from internet hoaxes? They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. Which of the following job design techniques does Carl implement in his store? What should you do? Greater physical distances can present logistical concerns when tasks require real-time communicationfor instance, during a military operation. In a study of 273 teleworkers from sales, marketing, accounting, engineering and other departments at one organization, Gajendran and Golden found that employees whose jobs were highly complex but did not require significant collaboration or social support performed better when telecommuting than when working in the companys office (Journal of Business and Psychology, Vol. Which of these is true of unclassified data? -Remove security badge as you enter a restaurant or retail establishment. Exceptionally grave damage. If you participate in or condone it at any time. Examples include but are not limited to the following: 1) an employee has a short-term need Supervisory Position: **Identity ManagementWhich of the following is the nest description of two-factor authentication? DOD Cyber Awareness Challenge 2019 - Subjecto.com open thread - March 3-4, 2023 Ask a Manager **Insider ThreatA colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. Employees who are teleworking should assess the portability of their work and the level of technology available at the remote site as they prepare to telework.