Classified material must be appropriately marked, everything Friends Only except your Name and Profile Picture - turn off "Check in location via GPS", Cyber Awareness Challenge 2022 Knowledge Check, Annual DoD Cyber Awareness Challenge Training, DOD Cyber Awareness Challenge 2019 (DOD-IAA-V, Cyber Awareness Challenge 2023 (Incomplete), Cyber Awareness Challenge 2021 - Knowledge Ch, Elliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson, Information Technology Project Management: Providing Measurable Organizational Value, Operations Management: Sustainability and Supply Chain Management, Service Management: Operations, Strategy, and Information Technology, Unit 2 Industrialization/Immigration - Review. Which of the following is a true statement? P2P (Peer-to-Peer) software can do the following except: -Allow attackers physical access to network assets. They support the strategy of corporate social responsibility by reducing an employee's need to commute using a vehicle. What should you do if someone forgets their access badge (physical access)? A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. What type of attack might this be? Alert box notification is currently enabled, please, Official Website of the U.S. Office of Personnel Management, follow this link to enable alert boxes for your session profile, follow this link to disable alert boxes for your session profile, Telework Managing Officers & Coordinators, Virtual Telework Fundamentals Training Courses, Telework and Performance Management Webcast Trainings, Enhancing Workplace Flexibilities and Work-Life Programs. What information relates to the physical or mental health of an individual? HIRING PREFERENCE SELECTION PROCESS: Applicants in the following hiring preference categories . Which of the following is NOT a typical means for spreading malicious code? Which of the following demonstrates proper protection of mobile devices? (Correct) -It does not affect the safety of Government missions. Jacoby, K.S., & Holland, S., In The Bridge: Connecting Science and Practice Society for Industrial and Organizational Psychology, Jan. 4, 2019, SIOP White Paper Series: Telecommuting WINDOWPANE is the live-streaming app for sharing your life as it happens, without filters, editing, or anything fake. Only allow mobile code to run from your organization or your organizations trusted sites. Golden affirms that coworking spaces may alleviate social isolation, but its unclear whether they address the professional isolation that out-of-office employees tend to experience, he says. Always use DoD PKI tokens within their designated classification level. 16, No. *SOCIAL NETWORKING*When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? A smartphone that transmits credit card payment information when held in proximity to a credit card reader. In addition to formally exploring any cultural or ideological differences, collaborators should also consider how such teams are led. **Identity managementWhat is the best way to protect your Common Access Card (CAC)? What is a possible indication of a malicious code attack in progress? Of the following, which is NOT a problem or concern of an Internet hoax? How does verbalizing an attitude make it more likely that the attitude will guide your behavior? A minimum of two (2) years of maintenance or construction semi-skilled work experience in skilled trades such as mechanical (HVAC and Plumbing), electrical, carpentry, with significant focus on building systems. For telework to function, one must receive permission or access from one's organization. Which of the following is NOT a typical result from running malicious code? *SOCIAL NETWORKING*When is the safest time to post details of your vacation activities on your social networking profile? The email states your account has been compromised and you are invited to click on the link in order to reset your password. Many workers view telecommuting as a job perk, with more than half seeking the arrangement as a way to improve work-life balance. **Classified DataWhat is required for an individual to access classified data? *SpillageWhich of the following may help prevent inadvertent spillage? Which of the following actions is appropriate after finding classified information on the Internet? You have reached the office door to exit your controlled area. Which of the following is NOT considered a potential insider threat indicator? -It is inherently not a secure technology. A good telework arrangement starts with a good self-assessment. **Insider ThreatWhich of the following should be reported as a potential security incident (in accordance with you Agencys insider threat policy)? A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complain about the credit card bills that his wife runs up. telework since the formative period of telework in the 1970's, 1980's and early 1990's [31]. Use TinyURLs preview feature to investigate where the link leads. Teleworkers also appear to work more. Interestingly, the growing popularity of remote work could end up dampening its benefits, suggests research by Gajendran. -Assuming open storage is always authorized in a secure facility, -Telework is only authorized for unclassified and confidential information, -Taking classified documents from your workspace. What is a best practice to protect data on your mobile computing device? Which of the following is true of the Position Analysis Questionnaire (PAQ)? Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? A coworker uses a personal electronic device in a secure area where their use is prohibited. 1, 2010). -Phishing can be an email with a hyperlink as bait. What files or other documents will I need to take with me when I leave my regular workplace the day before teleworking? What should be done to protect against insider threats? The parameters of this agreement are most often laid out by the agency policy and/or collective bargaining agreement but should include the following key elements: The manager and teleworker should work together to periodically evaluate the arrangement, make changes to the agreement as necessary, and re-sign the document. If you are an annuitant, please contact the Retirement Office during Open Season via one of the following methods: Using Open Season Express by calling 1-800-332-9798. What should you do? Which of the following is NOT a correct way to protect CUI? *SOCIAL ENGINEERING*How can you protect yourself from social engineering? 1) Which of the following statements about the U.S. workforce is true? Store it in a shielded sleeve to avoid chip cloning. CUI may be stored on any password-protected system. Bob, a coworker, has been going through a divorce, has financial difficulties and is displaying hostile behavior. Which of the following demonstrates proper protection of mobile devices? If possible, set your browser preferences to prompt you each time a website wants to store a cookie. Identify the job design method implemented at Tech-Marketing. [ 8.3.3 - Identify threats and attacks to an acquisition program life cycle . Which of the following is NOT sensitive information? -Using NIPRNet tokens on systems of higher classification level. You are reviewing your employees annual self evaluation. On the one hand, family and social obligations can easily bleed over into work hours. b. Construct the confidence interval at 95% for the mean difference between the two populations. Have your permissions from your organization, follow your organization guideline, use authorized equipment and software, employ cyber security best practice, perform telework in dedicated when home. You are having lunch at a local restaurant outside the installation, and you find a cd labeled "favorite song". -Use the government email system so you can encrypt the information and open the email on your government issued laptop. When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. Between 2005 and 2015, the number of U.S. employees who telecommuted increased by 115%. You can get your paper edited to read like this. 6, 2017). When would be a good time to post your vacation location and dates on your social networking website? A) They are only provided for employees who hold key strategic positions in a company B) They are the casiest to set up for manufacturing workers. Exceptionally grave damage. Store it in a shielded sleeve to avoid chip cloning. Verified answer. *Sensitive Compartmented InformationWhich of the following best describes the compromise of Sensitive Compartmented Information (SCI)? Simplify the expressions with all exponents positive. Which of the following is true of protecting classified data? When vacation is over, after you have returned home. internet internet-quiz cyber cyber-awareness true-statement telework organisation Please log in or register to answer this question. Which of the following job analysis methods requires subject-matter experts to evaluate a job in terms of abilities required to perform the job? What type of data must be handled and stored properly based on classification markings and handling caveats? _____ involves assessing the relative dollar value of each job to the organization in order to set up fair pay structures. In a shared office full of potential interruptions, that can be hard to do.. Since the URL does not start with https, do not provide you credit card information. \quad (2) For the fiscal year ended May 31, 2012, determine the amount of the gain or loss that would be recorded due to the change in the Allowance to Reduce Inventory to Market. Telework Eligible: No For More Info: NMassinguenj 840958473 massinguenj@state.gov Overview Hiring Path: Open to the public Who May Apply/Clarification From the Agency: All . Telecommuting supports the strategy of corporate social responsibility by reducing the employee's need to commute by vehicles. *PHYSICAL SECURITY*At which Cyberspace Protection Condition (CPCON) is the priority focus on critical and essential functions? -Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. The research has generally shown that for most outcomes, remote work leads to small but tangible benefits, says I/O psychologist Bradford Bell, PhD, professor and director of the Center for Advanced Human Resource Studies (CAHRS) at Cornell University. Connect to the Government Virtual Private Network (VPN).?? Carla Warne is an HR executive looking for a new job. 2003-2023 Chegg Inc. All rights reserved. Specifically, we focus on leaders who manage team members based in remote sites and/or telework one or more days each week. About the Telework Exchange, LLC The Telework Exchange is an online community focused on demonstrating the tangible value of telework and serving the emerging educational and communication. Answer The answer will depend largely on the requirements of your individual agency, the agency telework policy, and your manager. On a NIPRNet system while using it for a PKI-required task. You have reached the office door to exit your controlled area. In most organizations, telecommuting is not a right; its a privilege that you earn. *SOCIAL ENGINEERING*What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? But that's generally how we use "which of the following.". **Social EngineeringWhich of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Which of the following job design techniques involving the addition of decision-making authorities to a job is credited to Frederick Herzberg? The flexibility, balanced work-home life and other benefits of telecommuting ultimately work to improve employee morale. Software that install itself without the user's knowledge. Reducing the physical strain on employees performing the job. 99, No. National Archives & Records Administration, Sufficient portable work for the amount of telework proposed, Comfort with the technologies, if any, that will be needed to telework, Good communication with your manager, co-workers, customers that will enable a relatively seamless transition from onsite to offsite, Telework office space that is conducive to getting the work done, Dependent care (i.e., child care, elder care, or care of any other dependent adults) arrangements in place, Ability to be flexible about the telework arrangement to respond to the needs of the manager, the workgroup, and the work, Ability to work with minimal direct supervision, Location of the telework office (e.g., home or another alternative workplace), Equipment inventory (e.g., what the employee is supplying, what the agency is providing, and who is responsible to maintain it), A general overview of the type of work that will be performed while teleworking, Telework contact information (e.g., what phone number to use on the telework day). -When using a public device with a card reader, only use your DoD CAC to access unclassified information, Thumb drives, memory sticks, and flash drives are examples of. Let us have a look at your work and suggest how to improve it! D. D. the details of pay and benefits attached to the job. 0 votes . Which of the following is NOT true concerning a computer labeled SECRET? Which of the following attacks target high ranking officials and executives? -Never allow sensitive data on non-Government-issued mobile devices. In other cases, an organization may require its employees to work from home, for instance, if a branch office is shut down. Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? Mark SCI documents appropriately and use an approved SCI fax machine. It is true that certain employees who have mission-critical or emergency duties may be required to telework in crisis situations. **Home Computer SecurityHow can you protect your information when using wireless technology? a) A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. Which is a risk associated with removable media? 1 Answer. Questions that popped up because I incorrectly answered the Knowledge Check. At the personal level, team members who disclose personal information, such as a favorite television show or the birth of a child, also build stronger connections and more trust. Use the classified network for all work, including unclassified work. As researchers and managers practicing in the field, what we need to understand more fully is not if, but how, teleworking is best conducted to maximize work outputs.. Record the transaction using debits and credits. a person receives clear information about performance effectiveness from the work itself. Abrams, Z. Our technology solutions impact other state agencies, counties, cities, and the people of Washington. Which is NOT a way to protect removable media? A limitation in using the PAQ is that it _____. *IDENTITY MANAGEMENT*Which of the following is an example of a strong password? But more often, studies show, teleworkers professional obligations tend to extend beyond the traditional workday, interrupting family time and preventing teleworkers from ever truly disconnecting. For more information about agency-based telework training and/or information technology training, please consult your agency Telework Coordinator or TMO. When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. *UNCONTROLLED CLASSIFIED INFORMATION*Which of the following is NOT an example of CUI? Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? Helen Taylor works 10 hours a day for 4 days a week, while her colleagues work 8 hours a day for 5 days a week. To make jobs less repetitive and more interesting. Employees should consider the following factors in making an honest determination about their telework capabilities: Additionally, to be a successful teleworker you need to have work habits that support independent task performance. Which of the following is true about knowledge, skills, abilities, and other characteristics (KSAOs) that are required for a job? TPWD MISSION To manage and conserve the natural and cultural resources of Texas and to provide hunting, fishing and outdoor recreation opportunities for the use and enjoyment of present and future . Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Jane JonesSocial security number: 123-45-6789, Select the information on the data sheet that is protected health information (PHI). Which of the following is an important managing-by-results guideline to implement Praise in public, criticize in private Developing a structured work plan includes All of the above All of the following are important pieces of a communication plan EXCEPT Of-site meetings that a teleworker would attend in person All of the following are reminders about telework agreements EXCEPT Should not be . Report the crime to local law enforcement. -Personal information is inadvertently posted at a website. -Following instructions from verified personnel. A coworker has left an unknown CD on your desk. What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited? Her badge is not visible to you. Although telework is only one of the workplace flexibilities highlighted in the memorandum, the focus of these efforts provide additional momentum for building upon the requirements of passage of the Telework Enhancement Act of 2010 (the Act). Carl Borden, the manager of an electronics store in California, gives his staff the authority to resolve customer complaints. -It must be released to the public immediately. Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? The SDC provides the RSO with timely analysis of notable events and receives daily reports, which she/he is responsible for analyzing, translating, and inputting daily data into the Security Incident Management and Analysis System (SIMAS). Which of the following is a practice that helps to protect you from identity theft? They also need to shift their culture and norms to support the new arrangement.. Which of the following is NOT an example of CUI? (Wrong). Which of the following is an example of malicious code? -Monitor credit card statements for unauthorized purchases. Preferred formal educational background in one of the following: Business Administration, Project Management, Information Systems Management, National Security Studies, Computer Science, or . You must have permission from your organization How should you protect a printed classified document when it is not in use? Which method would be the BEST way to . Which of the following is NOT a typical result from running malicious code? Knowledge workers such as computer programmers who can do most of their work on a laptoptasks like creating software code, reports or spreadsheetsand people whose productivity is easily monitored, such as insurance claims adjusters or call center workers, are the most likely to telecommute, says Ravi Gajendran, PhD, assistant professor in the department of global leadership and management at Florida International University. *Malicious CodeWhat are some examples of malicious code? Store it in a General Services Administration (GSA)-approved vault or container Based on the description that follows, how many potetntial insider threat indicator (s) are displayed? A telework arrangement is the easiest to set up for manufacturing workers. In these cases, leadership functions need to be shifted to the team itself, so members with specific expertise can drive problem-solving in various areas.. Which method would be the BEST way to send this information? Workers tend to work alone at highly specialized jobs. ~A coworker brings a personal electronic device into a prohibited area. Your comments are due on Monday. -Directing you to a website that looks real. The process of getting detailed information about jobs is known as _____. b. identifying those who might be wasting their talents and not taking school seriously. question. These questions are answered in which phase of the project management? Spear Phishing attacks commonly attempt to impersonate email from trusted entities. a. d. All of the above are steps in the measurement process of external . How many potential insider threat indicators is Bob displaying? Classified material must be appropriately marked. 50, No. A related line of research is also exploring how to maximize the effectiveness of geographically distributed teams that rely primarily on virtual means of communication. What is considered a mobile computing device and therefore shouldn't be plugged in to your Government computer? The Act requires employees to successfully complete telework training before they can telework. **Identity ManagementWhich of the following is the nest description of two-factor authentication? Telecommuting arrangements can vary greatly for different workers. Employers can hire geographically distributed talent and reduce overhead expenses, while employees can gain flexibility, save time, and reduce transportation and some child-care costs. . List (not a written letter of reference) of a minimum of three (3) professional references with complete name, title, organization where he/she works, description of relationship, and with . How can you protect your information when using wireless technology? Employees must take responsibility for the security of the data and other information they handle while teleworking. Secure personal mobile devices to the same level as Government-issued systems. Retrieve classified documents promptly from printers. Note any identifying information, such as the websites URL, and report the situation to your security POC. c. Interpret the results in (a) and (b). However, there doesn't always have to be one correct answer. A remote work arrangement is one in which an employee is not required to regularly and repeatedly report to an agency workplace and is instead scheduled to perform work within or outside the local commuting area of the agency worksite.The employee supplies their own workspace, which is . What security device is used in email to verify the identity of sender? **Social NetworkingWhen is the safest time to post details of your vacation activities on your social networking website? 38, No. -Look for a digital signature on the email. If you are interested in teleworking, or already telework but want to ensure you become a more effective teleworker, here are the key steps to success. Social Security Number; date and place of birth; mothers maiden name. Telework Management was developed to follow our passion and dedicate time to developing others using our expertise in remote leadership and people development. You must possess security clearance eligibility to telework. -Remove security badge as you enter a restaurant or retail establishment. 1 Answer 0 votes answered by admic (1.0m points) selected by voice Best answer You must have your organization's permission to telework In another line of research, psychologists are exploring how to maximize the efficiency and productivity of teams that are geographically dispersed. Note any identifying information and the website's Uniform Resource Loctaor (URL). -It never requires classification markings. Which of the following does NOT constitute spillage? Before allowing employees to work remotely, organizations should reevaluate policies around performance evaluation, promotion and salary increases to ensure they dont favor on-site workers, she says. The study of the interface between individuals physiology and the characteristics of the physical work environment. You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. What should be your response? What should you do if someone asks to use your government issued mobile device (phone/laptop..etc)? With regard to COOP, note that Emergency Relocation Group (ERG) members must be prepared to telework at any time. A coworker removes sensitive information without approval. UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. If your organization allows it. In the teleworking sphere, psychologists are confident about a continuing upward trendBell anticipates such growth as businesses aim to attract employees in a tight labor market and as communication technologies become more sophisticatedbut theyre still probing a number of unanswered questions. -is only allowed if the organization permits it. -TRUE The use of webmail is -is only allowed if the organization permits it Using webmail may bypass built in security features. Helen is utilizing a flexible work schedule option known as _____. C. They support the strategy of corporate social responsibility by reducing an employee's need to commute using a vehicle. Telework. In many cases this is true. Let's not be totally reductive about these things. -You must have your organization's permission to telework. Which of the following is NOT a way that malicious code spreads? You receive an unexpected email from a friend: "I think youll like this: (URL)" What action should you take? The email has an attachment whose name contains the word "secret". What should you do? C. PAQ ratings cannot be used to compare dissimilar jobs. They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. B. Y is directly proportional to X then, Y = k X, where k is a variable. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. Answers: Apples, pears, oranges, bananas. The task force has created guidelines for the companys managers and employees who telework, drawing on research on work-family conflict (Greer, T.W., & Payne, S.C., The Psychologist-Manager Journal, Vol. *Sensitive InformationUnder which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? **Insider ThreatWhat type of activity or behavior should be reported as a potential insider threat? degree to which a job requires completing a whole piece of work from beginning to end. All agencies must designate a Telework Managing Officer (TMO), who is the agency's primary contact for policy and program questions. At that time, you may be eligible to continue to telework or work remotely two or more days a pay period consistent with the Census Bureau's flexible telework and remote work policies and approval from your supervisor. -Directing you to a web site that is real. A type of phishing targeted at high-level personnel such as senior officials. For some, operating from a co-working spacea shared office that provides telecommuters and freelancers with internet access, meeting rooms and other amenitiescan help address social isolation. The website requires a credit card for registration. inputs used in the development of the work unit's product. What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web? Which of the following is true of telework? And because teleworkers cant make social connections during watercooler chats, Jacoby also suggests alternative ways to support staff relationship-building, including online message boards and small stipends for virtual lunch or coffee dates. Chang invests $500\$ 500$500 in an account that earns 3.5%3.5 \%3.5% compounded annually. Which scenario might indicate a reportable insider threat? Essentially, telecommuting is allowing your full-time or part-time employees to work from home, or anywhere else they prefer, instead of a traditional office environment. The strength of Answer computing and the growth of the mobile digital platform allow organizations to rely more on telework, remote work, and distributed decision making. **Identity ManagementYour DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. The Cambridge Handbook of Technology and Employee Behavior, Cambridge University Press 2019, Digital Nomads: The Final Frontier of Work Arrangements? Discuss the difference. What should be done to sensitive data on laptops and other mobile computing devices? (b) Explain the rationale for the use of the lower-of . 6, 2007). You believe that you are a victim of identity theft. Neither confirm or deny the information is classified. Which of the following is true about telework? Look for a digital signature on the email. How can you guard yourself against Identity theft? You must have your organization's permission to telework. results in abstract reports that are of limited use. 4, 2014). *IDENTITY MANAGEMENT*What certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) card contain? Very High DoD Risk Level; Priority Critical Functions, High DoD Risk Level; Priority Critical and Essential Functions, Decline to let the person in and redirect her to security. Call your security point of contact immediately. In many cases, employees will need to plan for their telework days in order to be as effective as possible. bradenton florida ghetto, throttle body cleaning benefits,