6, 2007). New interest in learning another language? Which of the following is NOT Government computer misuse? Job descriptions generally contain all of the following components EXCEPT _____. The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. What is a valid response when identity theft occurs? You can email your employees information to yourself so you can work on it this weekend and go home now. Classified material must be appropriately marked. -Look for a digital signature on the email. Which of the following is true about knowledge, skills, abilities, and other characteristics (KSAOs) that are required for a job? A type of phishing targeted at high-level personnel such as senior officials. Mak, S., & Kozlowski, S.W.J., In Landers, R.N. Does OPM provide employee and/or manager training that agencies . Step 1: Know your Telework Managing Officer and Telework Coordinator All agencies must designate a Telework Managing Officer (TMO), who is the agency's primary contact for policy and program questions. What should be done if you find classified Government Data/Information Not Cleared for Public Release on the Internet? If possible, set your browser preferences to prompt you each time a website wants to store a cookie. In another example of research-informed telecommuting, Kaila Jacoby, a consultant with a masters degree in I/O psychology, leads a work-from-home task force at DCI Consulting, a human resources risk-management consulting firm in Washington, D.C. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. Answer The answer will depend largely on the requirements of your individual agency, the agency telework policy, and your manager. In a shared office full of potential interruptions, that can be hard to do.. The following practices help prevent viruses and the downloading of malicious code except. *Sensitive Compartmented InformationWhat is a Sensitive Compartmented Information (SCI) program? If classified information were released, which classification level would result in "Exceptionally grave damage to national security"? Which of the following makes Alex's personal information vulnerable to attacks by identity thieves? What is the best response if you find classified government data on the internet? *CLASSIFIED DATA*What is a good practice to protect classified information? Question : Which of the following is true about telework? When done well, remote work has the potential to improve performance, increase employee satisfaction and benefit a business., Supporting Virtual Collaborations Essentially, telecommuting is allowing your full-time or part-time employees to work from home, or anywhere else they prefer, instead of a traditional office environment. The email has an attachment whose name contains the word "secret". The following pairs of investment plan are identical except for a small difference in interest rates. Which of the following is the process of getting oxygen from the environment to the tissues of the body? Which of the following should be done to keep your home computer secure? *SpillageAfter reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Telework is here to stay, says industrial/organizational (I/O) psychologist Timothy Golden, PhD, professor and area coordinator of enterprise management and organization at, Rensselaer Polytechnic Institute in Troy, New York. What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? A coworker has asked if you want to download a programmers game to play at work. Employers may see these outcomes as positive, translating into higher productivity and better workplace citizenship. You can get your paper edited to read like this. **Identity ManagementWhich of the following is the nest description of two-factor authentication? Never allow sensitive data on non-Government-issued mobile devices. *SENSITIVE COMPARTMENTED INFORMATION*When faxing Sensitive Compartmented Information (SCI), what actions should you take? Which of the following should you do immediately? One can be at the same time appreciative of the need to include what to do under a threat of violence in employee training and viscerally opposed to the kind of active shooter drills that are currently en vogue. -Ask them to verify their name and office number *SpillageWhich of the following may help prevent inadvertent spillage? How many potential insiders threat indicators does this employee display? **Insider ThreatHow many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? *SOCIAL ENGINEERING*How can you protect yourself from internet hoaxes? For some, operating from a co-working spacea shared office that provides telecommuters and freelancers with internet access, meeting rooms and other amenitiescan help address social isolation. Which of the following is NOT a correct way to protect CUI? Which of the following is an important managing-by-results guideline to implement Praise in public, criticize in private Developing a structured work plan includes All of the above All of the following are important pieces of a communication plan EXCEPT Of-site meetings that a teleworker would attend in person All of the following are reminders about telework agreements EXCEPT Should not be . List (not a written letter of reference) of a minimum of three (3) professional references with complete name, title, organization where he/she works, description of relationship, and with . Which of the following is a best practice for handling cookies? There are many travel tips for mobile computing. How are Trojan horses, worms, and malicious scripts spread? What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure? C. Telecommuting supports the strategy of corporate social responsibility by reducingthe employee's need to commute by vehicles. Before long she has also purchased shoes from several other websites. 3, 2017). whether the employee is expected to work during agency closures or other Continuity of Operations (COOP) related emergencies or situations that may result in a disruption to normal office operations). Use your own facility access badge or key code. *IDENTITY MANAGEMENT*Which of the following is an example of a strong password? Which of the following demonstrates proper protection of mobile devices? Which of the following is NOT a potential insider threat? Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Which of the following represents a good physical security practice? C. They support the strategy of corporate social responsibility by reducing an employee's need to commute using a vehicle. What should you do? They also need to shift their culture and norms to support the new arrangement.. Qualified Offerors must upload the following (4) documents in ERA (Do not upload more documents) or their offers will not be considered for this position: 1. Of the following, which is NOT a problem or concern of an Internet hoax? Which of the following is true of telework arrangements? D. No. The U.S. Office of Personnel Management offers online telework training. Employees whose jobs require concentration or significant problem-solving often need focused time to think deeply about the task at hand, Golden says. Step 13: Participate in telework and lead by example Managers and supervisors must be committed to using telework to the fullest extent possible if Federal telework programs are to be successful. The company has collaborated with psychologists at Cornell University, including Bell, to proactively address issues such as employee isolation, and has seen rewards including reduced real estate costs and better talent retention. UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. Fortunately, geographic distance is not destiny, says Wilson, whose research shows that communication and shared identity within a team can mediate the effects of physical separation. Sensitive information may be stored on any password-protected system. How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? question. The Cambridge Handbook of Technology and Employee Behavior, Cambridge University Press 2019, Digital Nomads: The Final Frontier of Work Arrangements? What information posted publicly on your personal social networking profile represents a security risk? Quickly and professionally. This article will provide you with all the questions and answers for Cyber Awareness Challenge. *MALICIOUS CODE*Which of the following is NOT a way malicious code spreads? Which of the following is true about telework? Remove your security badge after leaving your controlled area or office building. As teams become more virtual, it may be impossible for a single person to direct an entire project, Kozlowski says. answered May 31, 2022 by Haren (305k points) Best answer. You are reviewing your employees annual self evaluation. What action is recommended when somebody calls you to inquire about your work environment or specific account information? It is getting late on Friday. What should you do to protect yourself while on social networks? Its time for organizations to move beyond seeing it as a family-friendly work arrangement. If authorized, what can be done on a work computer? Verified answer. One analysis showed that the blurring of such boundaries causes remote workers to associate their homes with their work roles as work obligations repeatedly intrude upon family time (Eddleston, K.A., & Mulki, J., Group & Organization Management, Vol. Follow instructions given only by verified personnel. _____ involves assessing the relative dollar value of each job to the organization in order to set up fair pay structures. Identification, encryption, and digital signature. Which of the following is true about telework? The final stage in work flow analysis is to identify the _____. Of the following, which is NOT a method to protect sensitive information? -Store it in a shielded sleeve to avoid chip cloning. **Website UseWhile you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. -Senior government personnel, military or civilian. Which of the following is NOT a correct way to protect CUI? Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? Employers can hire geographically distributed talent and reduce overhead expenses, while employees can gain flexibility, save time, and reduce transportation and some child-care costs. *SpillageWhich of the following is a good practice to aid in preventing spillage? 2, 2015). How many potential insiders threat indicators does this employee display? Which of the following is NOT Protected Health Information (PHI)? How many indicators does this employee display? Interestingly, the growing popularity of remote work could end up dampening its benefits, suggests research by Gajendran. Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? 7 How the project work will be carried out, monitored, and controlled? *INSIDER THREAT*What threat do insiders with authorized access to information or information systems pose? Which of these is true of unclassified data? The Telework Enhancement Act defines telework or teleworking as a work flexibility arrangement under which an employee performs the duties and responsibilities of such employee's position, and other authorized activities, from an approved worksite other than the location from which the employee would otherwise work. The research has generally shown that for most outcomes, remote work leads to small but tangible benefits, says I/O psychologist Bradford Bell, PhD, professor and director of the Center for Advanced Human Resource Studies (CAHRS) at Cornell University. Examples include but are not limited to the following: 1) an employee has a short-term need *SPILLAGE*Which of the following may be helpful to prevent spillage? Which of the following is a security best practice when using social networking sites? Sending regular mail to: Office of Personnel Management Open Season Processing Center P.O. you are indicating that all information is true and correct. The website requires a credit card for registration. Which of the following refers to a list of the tasks, duties, and responsibilities that a job entails? A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. Connect to the Government Virtual Private Network (VPN). It considers only the inputs of a work process, ignoring the outputs. Which of the following is a practice that helps to protect you from identity theft? These requirements constitute the _____. -TRUE The use of webmail is -is only allowed if the organization permits it Using webmail may bypass built in security features. HIRING PREFERENCE SELECTION PROCESS: Applicants in the following hiring preference categories . -If possible, set your browser preferences to prompt you each time a website wants to store a cookie. Use a single, complex password for your system and application logons. Telecommuting is a management tool just like any other, Gajendran says. Which of the following is true about telework? When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. What is the result of an organization structure that is strongly based on function? What describes how Sensitive Compartmented Information is marked? A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. **Mobile DevicesWhich is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? They support the strategy of corporate social responsibility by reducing an employee's need to commute using a vehicle. **Physical SecurityAt which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? Contact the IRS using their publicly available, official contact information. Which of the following should be reported as a potential security incident? *PHYSICAL SECURITY*Within a secure area, you see an individual who you do not know and is not wearing a visible badge. Approved Security Classification Guide (SCG). Additionally the National Archives & Records Administration provides guidance to agencies and their employees that applies to Federal records in a telework environment on NARA's FAQs about Telework. What should you do? *INSIDER THREAT*Based on the description below how many potential insider threat indicators are present? For the current COVID-19 Requirements please visit the following link. A coworker has asked if you want to download a programmer's game to play at work. The way teams are configuredthe number and distribution of members and sitesalso matters. What should you do if someone forgets their access badge (physical access)? Its not so much that telecommuting is good or bad; its just that sometimes its advantageous and sometimes its not, Gajendran says. A limitation in using the PAQ is that it _____. You are leaving the building where you work. How should you securely transport company information on a removable media? An employee can write reports or articles from a home office, but interpersonally sensitive tasks that may involve nonverbal communicationconducting a quarterly performance review with a subordinate, for exampletend to go more smoothly when handled face to face, says Golden. 21, No. Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. Telecommuting arrangements can vary greatly for different workers. The Federal Government is a leader in the use of innovative workplace arrangements like telework. The website requires a credit card for registration. Immediately notify your security point of contact. Which of the following is NOT a home security best practice? The study of the interface between individuals physiology and the characteristics of the physical work environment. A coworker uses a personal electronic device in a secure area where their use is prohibited. Which of the following is true about telework? What is the best course of action? -It never requires classification markings. Ive tried all the answers and it still tells me off, part 2. if you are a military personnel and you knowingly leaked, information may be cui in accordance with executive order 13526, intentional unauthorized disclosure of classified information, is it permitted to share an unclassified draft document, is press release data sensitive information, is whistleblowing the same as reporting an unauthorized disclosure, near field communication cyber awareness, near field communication cyber awareness 2022, opsec is a dissemination control category, opsec is a dissemination control category within the cui program, penalties for unauthorized disclosure of classified information, relates to reporting of gross mismanagement and/or abuse of authority, requirements to access classified information, the act of publicly documenting and sharing information is called, the whistleblower protection enhancement act relates to reporting, unauthorized disclosure of classified information, unauthorized disclosure of classified information for dod and industry, unauthorized disclosure of information classified as confidential, what can malicious code do cyber awareness challenge, what dod instruction implements the dod program, what is a possible effect of malicious code, what is a possible effect of malicious code cyber awareness, what is a protection against internet hoaxes, what is a protection against internet hoaxes cyber awareness, what is possible effect of malicious code, what is protection against internet hoaxes, what is purpose of the isoo cui registry, what is required for an individual to access classified data, what is sensitive compartmented information cyber awareness 2022, what is the possible effect of malicious code, what is the purpose of isoo cui registry, what is the purpose of the isoo registry, what level of damage can the unauthorized disclosure of information, what security risk does a public wi-fi connection pose, what should the owner of this printed sci do differently, what should you do if you suspect spillage has occurred, what threat do insiders with authorized, what threat do insiders with authorized access to information, what threat do insiders with authorized access to information pose, when can you check personal email on your gfe, when using social networking services the penalties for ignoring requirements, which of the following individuals can access classified data 2022, which of the following is an example of nfc, which of the following is good practice to prevent spillage, which of the following is true about protecting classified data, which of the following is true of protecting classified data, which of the following may help prevent spillage, which of the following may help to prevent spillage, which of the following represents a good physical security practice, which of these is true of unclassified data, whistleblowing should be used to report which of the following, who is responsible for applying cui markings and dissemination instructions. 62, No. *UNCONTROLLED CLASSIFIED INFORMATION*Which of the following is NOT a correct way to protect CUI? CUI may be stored on any password-protected system. -Assuming open storage is always authorized in a secure facility, -Telework is only authorized for unclassified and confidential information, -Taking classified documents from your workspace. You are logged on to your unclassified computer and just received an encrypted email from a co-worker. A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? You have reached the office door to exit your controlled area. Call your security point of contact immediately. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. -Make note of any identifying information and the website URL and report it to your security office. You are having lunch at a local restaurant outside the installation, and you find a cd labeled "favorite song". Those include the effects of increasing the extent of telecommuting, best practices for managers and the relative effectiveness of various communication methods, particularly video, says Golden. Within a secure area, you see an individual you do not know. Which of the following actions is appropriate after finding classified information on the Internet? b. Construct the confidence interval at 95% for the mean difference between the two populations. -Carrying his Social Security Card with him. **Insider ThreatWhich of the following should be reported as a potential security incident? How many potential insider threat indicators does this employee display?