Local Integrating Organization (LIO) Program Coordinator (EMS 1) A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. Very High DoD Risk Level; Priority Critical Functions, High DoD Risk Level; Priority Critical and Essential Functions, Decline to let the person in and redirect her to security. But a handful of organizations are effectively using research insights to build evidence-based remote work programsand reaping the rewards. Work with our consultant to learn what to alter. Which of the following is true about telework? In another example of research-informed telecommuting, Kaila Jacoby, a consultant with a masters degree in I/O psychology, leads a work-from-home task force at DCI Consulting, a human resources risk-management consulting firm in Washington, D.C. In June 2014, President Obama issued a Presidential Memorandum entitled, Enhancing Workplace Flexibilities and Work-Life Programs, as a way to help attract, empower and retain a talented and productive workforce in the 21st century. After clicking on a link on a website, a box pops up and asks if you want to run an application. All https sites are legitimate and there is no risk to entering your personal info online. You must possess security clearance eligibility to telework. Which method would be the BEST way to . DoD Cyber Awareness 2019 - Subjecto.com Which of the following is an invalid guideline for securing telework computers and laptops , per the National Institute of Standards and Technology ( NIST ) Special Publication ( SP ) 800-114 ? Understanding and using the available privacy settings. Which of the following is true about telework A Telework is the most Mak, S., & Kozlowski, S.W.J., In Landers, R.N. Telework Basics - Telework.gov Cyber Awareness Challenge Complete Questions and Answers. 2003-2023 Chegg Inc. All rights reserved. Lock your device screen when not in use and require a password to reactivate. Record the transaction using debits and credits. Get IT support Teleworkers are dependent on fast, reliable, consistent connections. Texas Parks and Wildlife Department hiring TPWD - Maintenance Note any identifying information and the website's Uniform Resource Loctaor (URL). Which of the following HR activities is similar to analyzing a job that does not yet exist? If you are an annuitant, please contact the Retirement Office during Open Season via one of the following methods: Using Open Season Express by calling 1-800-332-9798. What is the result of an organization structure that is strongly based on function? You are having lunch at a local restaurant outside the installation, and you find a cd labeled "favorite song". *HOME COMPUTER SECURITY*Which of the following is a best practice for securing your home computer? *IDENTITY MANAGEMENT*Which of the following is an example of a strong password? Something you possess, like a CAC, and something you know, like a PIN or password. Connect to the Government Virtual Private Network (VPN).?? Company leaders hesitation around flexible work arrangements is often driven by the fear that performance will suffer if employees arent closely monitored. Which of the following is NOT a potential insider threat? Which of the following is an example of malicious code? What should be your response? The information that I provide while filling out this online employment application form and completing the application process, including possibly sensitive data, will be transferred online, stored, and processed on a server in the United States of America. Which of the following is NOT true of traveling overseas with a mobile phonePhysical security of mobile phones carried overseas is not a major issue. At that time, you may be eligible to continue to telework or work remotely two or more days a pay period consistent with the Census Bureau's flexible telework and remote work policies and approval from your supervisor. A) The U.S. workforce is becoming older, and younger workers are more educated B) The U.S. workforce is becoming younger, and younger workers are more educated C) The U.S. workforce is becoming younger, and older workers are more educated She comes across an advertisement in a newspaper seeking applications for the post of an HR manager. D. Y is indirectly proportional to X then, Y = k X, where k is a variable. *INSIDER THREAT*Which of the following is NOT considered a potential insider threat indicator? Which of the following is NOT a correct way to protect CUI? P2P (Peer-to-Peer) software can do the following except: -Allow attackers physical access to network assets. Be aware of classification markings and all handling caveats. -Setting weekly time for virus scan when you are not on the computer and it is powered off. National Research Council, Enhancing the Effectiveness of Team Science, National Academies Press, 2015, Virtual Teams: Conceptualization, Integrative Review and Research Recommendations Which of the following is true of telework - Course Hero -Use the government email system so you can encrypt the information and open the email on your government issued laptop. Be aware of classification markings and all handling caveats. Which of the following is an example of Protected Health Information (PHI)? Classified material must be appropriately marked. d. All of the above are steps in the measurement process of external . If aggregated, the information could become classified. Steve Riddle - Director, Coach & Mentor: Leadership. People - LinkedIn Answer The answer will depend largely on the requirements of your individual agency, the agency telework policy, and your manager. Which of the following should you NOT do if you find classified information on the internet? Which of the following is NOT an example of sensitive information? Which of the following does NOT constitute spillage? *INSIDER THREAT*Based on the description below how many potential insider threat indicators are present? 42, No. As part of the survey the caller asks for birth date and address. -If possible, set your browser preferences to prompt you each time a website wants to store a cookie. A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. They also need to shift their culture and norms to support the new arrangement.. Which of the following should you NOT do if you find classified information on the internet? Companies that have backtracked on remote worksuch as Yahoo and IBMmake headlines because theyre outliers in the general trend toward teleworking, says Bell. -Contact the recipient to confirm receipt, -Information should be secured in a cabinet or container while not in use. What is an indication that malicious code is running on your system? Spillage because classified data was moved to a lower classification level system without authorization. Which of the following is true of protecting classified data? D. Which of the following is NOT one? The Act requires employees to successfully complete telework training before they can telework. Essentially, telecommuting is allowing your full-time or part-time employees to work from home, or anywhere else they prefer, instead of a traditional office environment. Before long she has also purchased shoes from several other websites. -Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. The final stage in work flow analysis is to identify the _____. A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. Solved 1) Which of the following statements about the - Chegg Which of the following is true about telework? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. Which of the following should be reported as a potential security incident? *Sensitive Compartmented InformationWhich must be approved and signed by a cognizant Original Classification Authority (OCA)? Jacoby recommends that firms get company-wide buy-in for telework and include remote workers in all team- and company-wide events, via video conferencing when necessary. An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? **Mobile DevicesWhich is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? A man you do not know is trying to look at your Government-issued phone and has asked to use it. How many potential insiders threat . You are reviewing your employees annual self evaluation. **Insider ThreatWhat advantages do insider threats have over others that allows them to cause damage to their organizations more easily? **Classified DataWhich of the following is true of protecting classified data? Before allowing employees to work remotely, organizations should reevaluate policies around performance evaluation, promotion and salary increases to ensure they dont favor on-site workers, she says. After you have returned home following the vacation. The Corporate Transparency Act (CTA) was enacted to prevent money laundering and promote a "know your customer" policy by imposing new disclosure requirements on "reporting companies." -It is inherently not a secure technology. open thread - March 3-4, 2023 Ask a Manager The following chart, . In the Job Characteristics Model, task identity is defined as the _____. Remove your security badge after leaving your controlled area or office building. Always use DoD PKI tokens within their designated classification level. *UNCONTROLLED CLASSIFIED INFORMATION*Which of the following is NOT a correct way to protect CUI? Which of the following is NOT Government computer misuse?