Cyber Awareness Challenge 2021 Flashcards | Quizlet As researchers and managers practicing in the field, what we need to understand more fully is not if, but how, teleworking is best conducted to maximize work outputs.. b. In the teleworking sphere, psychologists are confident about a continuing upward trendBell anticipates such growth as businesses aim to attract employees in a tight labor market and as communication technologies become more sophisticatedbut theyre still probing a number of unanswered questions. Investigate the links actual destination using the preview feature. **Mobile DevicesWhich of the following helps protect data on your personal mobile devices? Upon connecting your Government- issued laptop to a public wireless connection, what should you immediately do? How are Trojan horses, worms, and malicious scripts spread? It can offer freedom from office distractions, reduce work-life stress, and provide an alternative workplace arrangement in case of emergencies. A smartphone that transmits credit card payment information when held in proximity to a credit card reader. What action is recommended when somebody calls you to inquire about your work environment or specific account information? 7 How the project work will be carried out, monitored, and controlled? -If possible, set your browser preferences to prompt you each time a website wants to store a cookie. - CUI is an umbrella term that encompasses many different markings to identify information that is not classified but which should be protected. Note any identifying information, such as the websites URL, and report the situation to your security POC. Spear Phishing attacks commonly attempt to impersonate email from trusted entities. What should you do? In a survey his team conducted, nearly all companies interviewed said they intend to continue offering teleworking or expand its use in the future (Workplace Redesign: Current Trends, Challenges, and Opportunities, CAHRS White Paper, 2019). New interest in learning a foreign language. What actions should you take prior to leaving the work environment and going to lunch? Label all files, removable media, and subject headers with appropriate classification markings. Which of the following is true of telework? (a) (1) Determine the proper balance in the Allowance to Reduce Inventory to Market at May 31, 2012. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complain about the credit card bills that his wife runs up. Which of the following is NOT true concerning a computer labeled SECRET? **Social EngineeringWhich of the following is a way to protect against social engineering? -Use TinyURL's preview feature to investigate where the link leads. At that time, you may be eligible to continue to telework or work remotely two or more days a pay period consistent with the Census Bureau's flexible telework and remote work policies and approval from your supervisor. Which of the following is true of protecting classified data? What should be your response? Questions that popped up because I incorrectly answered the Knowledge Check. What information relates to the physical or mental health of an individual? A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Telework Eligible: No For More Info: NMassinguenj 840958473 massinguenj@state.gov Overview Hiring Path: Open to the public Who May Apply/Clarification From the Agency: All . degree to which a job requires completing a whole piece of work from beginning to end. Telework Basics - Telework.gov *IDENTITY MANAGEMENT*What certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) card contain? National Archives & Records Administration, Sufficient portable work for the amount of telework proposed, Comfort with the technologies, if any, that will be needed to telework, Good communication with your manager, co-workers, customers that will enable a relatively seamless transition from onsite to offsite, Telework office space that is conducive to getting the work done, Dependent care (i.e., child care, elder care, or care of any other dependent adults) arrangements in place, Ability to be flexible about the telework arrangement to respond to the needs of the manager, the workgroup, and the work, Ability to work with minimal direct supervision, Location of the telework office (e.g., home or another alternative workplace), Equipment inventory (e.g., what the employee is supplying, what the agency is providing, and who is responsible to maintain it), A general overview of the type of work that will be performed while teleworking, Telework contact information (e.g., what phone number to use on the telework day). What should you do? After clicking on a link on a website, a box pops up and asks if you want to run an application. 2, 2014), employee engagement (Masuda, A.D., et al., Career Development International, Vol. Immediately notify your security point of contact. This work rule allows employees to work additional hours before or after the time period in order to work the full day. The parameters of this agreement are most often laid out by the agency policy and/or collective bargaining agreement but should include the following key elements: The manager and teleworker should work together to periodically evaluate the arrangement, make changes to the agreement as necessary, and re-sign the document. -You must have your organization's permission to telework. But more often, studies show, teleworkers professional obligations tend to extend beyond the traditional workday, interrupting family time and preventing teleworkers from ever truly disconnecting. Also, information technology security training is mandatory at the agency level, and teleworkers must complete this training and understand their responsibilities in safeguarding work-related information. A study of 101 virtual teams co-authored by Steve Kozlowski, PhD, professor of organizational psychology at Michigan State University, shows that shared leadership rather than traditional hierarchical leadership is associated with improved team performance (Hoch, J.E., & Kozlowski, S.W.J., Journal of Applied Psychology, Vol. These habits include: For more information, visit theSelf-Assessment & Safety Checklist pages. All agencies must designate a Telework Managing Officer (TMO), who is the agency's primary contact for policy and program questions. 1, 2019). List (not a written letter of reference) of a minimum of three (3) professional references with complete name, title, organization where he/she works, description of relationship, and with . They also need to shift their culture and norms to support the new arrangement.. Which of the following makes Alex's personal information vulnerable to attacks by identity thieves? Accounting is "an information system that identifies, records, and communicates the economic events of an organization to interested users." Instructions Categorize the accounting tasks performed by Genesis as relating to either the identification (I), recording (R), or communication (C) aspects of accounting. Remove your security badge after leaving your controlled area or office building. As detailed in the Act, all agencies must have a telework policy. Shockley, K. Society for Industrial and Organizational Psychology, 2014. In the context of work flow design, a position is _____. What security device is used in email to verify the identity of sender? Fell free get in touch with us via phone or send us a message. In which situation below are you permitted to use your PKI token? What describes how Sensitive Compartmented Information is marked? -Sanitized information gathered from personnel records. Which of the following refers to a list of the tasks, duties, and responsibilities that a job entails? *MALICIOUS CODE*Which of the following is NOT a way malicious code spreads? What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? Which of the following is NOT a potential insider threat? Let us have a look at your work and suggest how to improve it! -Looking for "https" in the URL. What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited? Discuss the difference. Which of the following should you NOT do if you find classified information on the internet? What should you do if someone forgets their access badge (physical access)? Which of the following is an invalid guideline for securing telework computers and laptops , per the National Institute of Standards and Technology ( NIST ) Special Publication ( SP ) 800-114 ? Which of the following is true of self-managing work teams? Solved 1) Which of the following statements about the - Chegg After you have returned home following the vacation. Phishing can be an email with a hyperlink as bait. The mood boost and the overall increase in satisfaction of employees who work from home in turn cycles back to increased levels of productivity and improved work performance. When using your home network to telework, an unsecured IoT device could become an attack vector to any attached government-furnished equipment (GFE). What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? For instance, a meta-analysis by Gajendran and a co-author found that telecommuters relationships with colleagues generally only suffered if they worked remotely three or more days each week (Journal of Applied Psychology, Vol. Disabling cookies. A related line of research is also exploring how to maximize the effectiveness of geographically distributed teams that rely primarily on virtual means of communication. Use TinyURLs preview feature to investigate where the link leads. Which of the following is true about telework? What information posted publicly on your personal social networking profile represents a security risk? *MOBILE DEVICES*Which of the following is an example of near field communication (NFC)? Classified material must be appropriately marked. *SOCIAL ENGINEERING*How can you protect yourself from social engineering? "Telework is a work arrangement that allows an employee to perform work during any part of regular, paid hours, at an approved alternative worksite (e.g., home or telework center). Under DLA policy, a first-line supervisor may be delegated authority to: Approved telework requests. What action should you take? A type of phishing targeted at high-level personnel such as senior officials. A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. (Ed.) 252 Program Management Mod 8.docx - Course Hero How does verbalizing an attitude make it more likely that the attitude will guide your behavior? Ask for information about the website, including the URL. telework since the formative period of telework in the 1970's, 1980's and early 1990's [31]. Ive tried all the answers and it still tells me off, part 2. DOD Cyber Awareness Challenge 2019- Knowledge Check Use personal information to help create strong passwords. a. Analyze the impact of the transaction on the accounting equation. c. Post the transaction to the T-account in the general ledger. -Delete email from senders you do not know. Those workers tend to be older, more educated, full time and nonunion. . The website requires a credit card for registration. Be aware of classification markings and all handling caveats. Telecommuting Benefits for Employees and Employers - Indeed Geotagging posts using Global Positioning System (GPS) or location links Accepting all information posted by your network as true ~Understanding and using the available privacy settings Connecting with people who share mutual connections with you, even if you don't know them **Social Networking They can be fully or partially remote; they may work from a home office, co-working space or other location; and increasingly they may be geographically distant from the organization or clients they serve. If you participate in or condone it at any time. (Wrong). They are the most difficult to implement for people in managerial or professional jobs. Study the diagram of the hemispheres on page 20 . A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. Issues that should be addressed include: This website uses features which update page content based on user actions. Only allow mobile code to run from your organization or your organizations trusted sites. 38, No. -Setting weekly time for virus scan when you are not on the computer and it is powered off. *Sensitive InformationWhat type of unclassified material should always be marked with a special handling caveat? question. What should you do? Get IT support Teleworkers are dependent on fast, reliable, consistent connections. As teams become more virtual, it may be impossible for a single person to direct an entire project, Kozlowski says. Within a secure area, you see an individual you do not know. Which of the following is NOT a best practice to protect data on your mobile computing device? Neither confirm or deny the information is classified. Which of these is true of unclassified data?-Its classification level may rise when aggregated. 34, No. Additionally the National Archives & Records Administration provides guidance to agencies and their employees that applies to Federal records in a telework environment on NARA's FAQs about Telework. Step 13: Participate in telework and lead by example Managers and supervisors must be committed to using telework to the fullest extent possible if Federal telework programs are to be successful. You must have your organizations permission to telework. Those include the effects of increasing the extent of telecommuting, best practices for managers and the relative effectiveness of various communication methods, particularly video, says Golden. Telework. An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? What should you do if someone asks to use your government issued mobile device (phone/laptop..etc)? *INSIDER THREAT*Based on the description below how many potential insider threat indicators are present? *USE OF GFE*What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? Golden affirms that coworking spaces may alleviate social isolation, but its unclear whether they address the professional isolation that out-of-office employees tend to experience, he says. Your comments are due on Monday. a) A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. The future of remote work. Which of the following is true? - BYJUS All of the Partnership's employees have access and are welcome to enjoy the following: . Additionally, when employees are happy, the . Very High DoD Risk Level; Priority Critical Functions, High DoD Risk Level; Priority Critical and Essential Functions, Decline to let the person in and redirect her to security. Which type of information includes personal, payroll, medical, and operational information? which of the following is true of telework PDF Guide to Telework in the Federal Government Local Integrating Organization (LIO) Program Coordinator (EMS 1) Jacoby recommends that firms get company-wide buy-in for telework and include remote workers in all team- and company-wide events, via video conferencing when necessary. * CLASSIFIED DATA*Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? Which of the following is NOT Government computer misuse? b. identifying those who might be wasting their talents and not taking school seriously. Still, he says, companies that offer telework arrangements strategicallyby making it contingent upon hitting performance targets, for instancemay be able to avoid such pitfalls. Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. You receive a call on your work phone and you're asked to participate in a phone survey. **Insider ThreatWhich of the following should be reported as a potential security incident (in accordance with you Agencys insider threat policy)? You can find your Telework Coordinator by searching OPM's Telework Contact Tool. Which of the following definitions is true about disclosure of confidential information? **Classified DataWhat is a good practice to protect classified information? Abrams, Z. Companies that have backtracked on remote worksuch as Yahoo and IBMmake headlines because theyre outliers in the general trend toward teleworking, says Bell. Something you possess, like a CAC, and something you know, like a PIN or password. In another line of research, psychologists are exploring how to maximize the efficiency and productivity of teams that are geographically dispersed. -Never allow sensitive data on non-Government-issued mobile devices. *Sensitive InformationUnder what circumstances could classified information be considered a threat to national security? New interest in learning another language? reducing the information-processing requirements of a job. Which of the following is not a step in the process of measuring external transactions? At the personal level, team members who disclose personal information, such as a favorite television show or the birth of a child, also build stronger connections and more trust. A remote work arrangement is one in which an employee is not required to regularly and repeatedly report to an agency workplace and is instead scheduled to perform work within or outside the local commuting area of the agency worksite.The employee supplies their own workspace, which is . CUI may be stored on any password-protected system. All the . What should you do? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. which of the following is true of telework - the Solution What should you do to protect classified data? Which of the following statements is NOT true about protecting your virtual identity? Classified information that should be unclassified and is downgraded. Moving forward, he hopes to see researchers studying virtual teams do a better job of building on those existing insights, such as by investigating how to coordinate knowledge sharing in virtual teams. Chap 4 Flashcards | Chegg.com On the one hand, family and social obligations can easily bleed over into work hours. While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. *SOCIAL NETWORKING*When is the safest time to post details of your vacation activities on your social networking profile? -Connect to the Government Virtual Private Network (VPN).?? You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. In other cases, an organization may require its employees to work from home, for instance, if a branch office is shut down. *TRAVEL*Which of the following is a concern when using your Government-issued laptop in public? It is true that certain employees who have mission-critical or emergency duties may be required to telework in crisis situations. The advertisement exclusively highlights requirements such as strong communication skills, excellent teamwork, and leadership skills. A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. Its classification level may rise when aggregated. Graph the solution set of the inequality, where xxx is a real number, on the number line. Exceptionally grave damage. Classified material must be appropriately marked. In a study of 273 teleworkers from sales, marketing, accounting, engineering and other departments at one organization, Gajendran and Golden found that employees whose jobs were highly complex but did not require significant collaboration or social support performed better when telecommuting than when working in the companys office (Journal of Business and Psychology, Vol. -Linda encrypts all of the sensitive data on her government-issued mobile devices. A manager of a revenue center is responsible for all of the following EXCEPT a. service quality and units sold. Which of the following is a security best practice when using social networking sites? . What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure? Which of the following is true about telework? - Study With Us! Does OPM provide employee and/or manager training that agencies . A work option in which two part-time employees carry out the tasks associated with a single job. ~A coworker brings a personal electronic device into a prohibited area. Which of the following is NOT a requirement for telework? -Assuming open storage is always authorized in a secure facility, -Telework is only authorized for unclassified and confidential information, -Taking classified documents from your workspace. -Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. Using webmail may bypass built in security features. In which situation below are you permitted to use your PKI token? Which of the following is true of telework? Health-care company Aetna, for example, has a decade-old remote work program that screens, trains and supports teleworkersa group that now makes up around half of the companys workforce. The following practices help prevent viruses and the downloading of malicious code except. Which of the following should be reported as a potential security incident? You are having lunch at a local restaurant outside the installation, and you find a cd labeled "favorite song". A telework arrangement is the easiest to set up for manufacturing workers. In addition, cultural differences, such as how direct eye contact is perceived, influence the way people interact. C. PAQ ratings cannot be used to compare dissimilar jobs. D. Y is indirectly proportional to X then, Y = k X, where k is a variable. You can email your employees information to yourself so you can work on it this weekend and go home now. Which of the following is true about telework? Of the following, which is NOT a security awareness tip? Tuesday, February 28, 2023. What should be done to sensitive data on laptops and other mobile computing devices? 22, No. *INSIDER THREAT*Which of the following is NOT considered a potential insider threat indicator? As long as the document is cleared for public release, you may release it outside of DoD. C. They support the strategy of corporate social responsibility by reducing an employee's need to commute using a vehicle. B. which of the following is true of telework An insider threat uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions resulting in loss or degradation of resources or capabilities. Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. Which of the following is NOT a correct way to protect sensitive information? It is getting late on Friday. -Ask them to verify their name and office number. Seeker - Vacancy - Detail Overview Which of the following best describes the sources that contribute to your online identity? Examples are: Patient names, Social Security numbers, Drivers license numbers, insurance details, and birth dates. A coworker removes sensitive information without authorization. $8,109-$11k/mo Digital Accessibility Manager at State of Washington In another example of research-informed telecommuting, Kaila Jacoby, a consultant with a masters degree in I/O psychology, leads a work-from-home task force at DCI Consulting, a human resources risk-management consulting firm in Washington, D.C. Frequently Asked Questions - OPM.gov As a security best practice, what should you do before exiting? Steve Riddle - Director, Coach & Mentor: Leadership. People - LinkedIn Someone calls from an unknown number and says they are from IT and need some information about your computer. Seeker - Vacancy - Detail Overview These questions are answered in which phase of the project management? The Cambridge Handbook of Technology and Employee Behavior, Cambridge University Press 2019, Digital Nomads: The Final Frontier of Work Arrangements? *SpillageWhich of the following may help prevent inadvertent spillage? What is the best response if you find classified government data on the internet? Meanwhile, Wilson is expanding her focus to explore the roles of extroversion and attractivenessboth of which are associated with leadershipin virtual team dynamics. Which of the following is NOT sensitive information? It is permissible to release unclassified information to the public prior to being cleared. What should be your response? Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. *SpillageWhat should you do if a reporter asks you about potentially classified information on the web? **Classified DataWhich of the following is true of protecting classified data? Reducing the physical strain on employees performing the job. the Telework Enhancement Act of 2010 (the Act). Many workers view telecommuting as a job perk, with more than half seeking the arrangement as a way to improve work-life balance. Which of the following is true? 1, 2010). 16, No. (b) Explain the rationale for the use of the lower-of .
Does Lori Harvey Have Tattoos,
Lauren Elizabeth La Collective Scandal,
Chiron Conjunct Venus Synastry Lindaland,
Desert Sands Unified School District Salary Schedule,
Scott Reisch Wife Kristen,
Articles W