What should you do after you have ended a call from a reporter asking you to confirm potentially classified information found on the web? -It must be released to the public immediately. Despite the largely positive findings on the benefits of telecommuting, just 7% of American companies offer the option to most or all of their employees, according to recent BLS data. Of the following, which is NOT a security awareness tip? Sending regular mail to: Office of Personnel Management Open Season Processing Center P.O. Ask for information about the website, including the URL. Ask the individual to see an identification badge. telework since the formative period of telework in the 1970's, 1980's and early 1990's [31]. Secure personal mobile devices to the same level as Government-issued systems. You know this project is classified. Work with our consultant to learn what to alter. Call your security point of contact immediately. He found that when telecommuting is less common at a company, employees tend to perform best when they work primarily remotely. Connect to the Government Virtual Private Network (VPN).?? **Insider ThreatA colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. These updated FAQs were released to the public in Fact Sheet 2022-16 PDF, March 3, 2022.. What information posted publicly on your personal social networking profile represents a security risk? Alert box notification is currently enabled, please, Official Website of the U.S. Office of Personnel Management, follow this link to enable alert boxes for your session profile, follow this link to disable alert boxes for your session profile, Telework Managing Officers & Coordinators, Virtual Telework Fundamentals Training Courses, Telework and Performance Management Webcast Trainings, Enhancing Workplace Flexibilities and Work-Life Programs. 38, No. How many indicators does this employee display? List (not a written letter of reference) of a minimum of three (3) professional references with complete name, title, organization where he/she works, description of relationship, and with . The research has generally shown that for most outcomes, remote work leads to small but tangible benefits, says I/O psychologist Bradford Bell, PhD, professor and director of the Center for Advanced Human Resource Studies (CAHRS) at Cornell University. Which of the following is NOT true of traveling overseas with a mobile phone? -Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. As a security best practice, what should you do before exiting? What should you do? What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited? As teams become more virtual, it may be impossible for a single person to direct an entire project, Kozlowski says. 99, No. Which of the following is NOT a typical means for spreading malicious code? -Look for a digital signature on the email. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. 62, No. What action should you take? Teams with a strong group identityfor instance, those that have unified against a competing team or organizationtend to have more perceived proximity, Wilson says. -Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. It is getting late on Friday. Classified material must be appropriately marked. -Ask them to verify their name and office number. Additionally the National Archives & Records Administration provides guidance to agencies and their employees that applies to Federal records in a telework environment on NARA's FAQs about Telework. **Website UseWhile you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. D. Ive tried all the answers and it still tells me off, part 2. C. Telecommuting supports the strategy of corporate social responsibility by reducingthe employee's need to commute by vehicles. One can be at the same time appreciative of the need to include what to do under a threat of violence in employee training and viscerally opposed to the kind of active shooter drills that are currently en vogue. The process of getting detailed information about jobs is known as _____. 4, 2014). Physical security of mobile phones carried overseas is not a major issue. The industrial engineering approach is most likely to emphasize _____. -Directing you to a website that looks real. 42, No. Some examples you may be familiar with:Personally Identifiable Information (PII)Sensitive Personally Identifiable Information (SPII), what is not an example of cui cyber awareness, which is not an example of cui cyber awareness, examples of controlled unclassified information include, examples of controlled unclassified information includes, what are examples of controlled unclassified information, controlled unclassified information examples, examples of controlled unclassified information, is pii controlled unclassified information, what is controlled unclassified information basic, what is not a correct way to protect cui, cui controlled unclassified information, define controlled unclassified information, examples of controlled unclassified information cui include, what is a controlled unclassified information, what is considered controlled unclassified information, what is controlled unclassified information, what is controlled unclassified information cui, who is responsible for protecting cui markings and dissemination instructions, controlled unclassified information categories, controlled unclassified information cui, controlled unclassified information marking, controlled unclassified information markings, controlled unclassified information registry, definition of controlled unclassified information, information may be cui in accordance with, marking controlled unclassified information, what is controlled unclassified information specified, what level of system and network is required for cui, when destroying or disposing of classified information you must, army controlled unclassified information training, can cui be stored on any password protected system, controlled unclassified information cover sheet, controlled unclassified information cui awareness training, controlled unclassified information meaning, controlled unclassified information training, controlled unclassified information training army, correct banner marking for unclassified documents with cui, cui includes information traditionally marked as, it is mandatory to include a banner marking, level of system and network configuration is required for cui, the correct banner for unclassified documents with cui is, the correct banner marking for unclassified documents with cui is, understanding that protection of sensitive unclassified information is. You are working at your unclassified system and receive an email from a coworker containing a classified attachment. It always refers to a multiple-choice question. "Telework is a work arrangement that allows an employee to perform work during any part of regular, paid hours, at an approved alternative worksite (e.g., home or telework center). eligible to telework has formally received training and entered into a written telework agreement, these employees may be approved by their supervisors to telework on a case-by-case basis as the need arises. Cyber Awareness Challenge Complete Questions and Answers. identify the correct and incorrect statements about executive orders. In which situation below are you permitted to use your PKI token? You have reached the office door to exit your controlled area. How many potential insiders threat indicators does this employee display? Which of the following is NOT a home security best practice? Use your own facility access badge or key code. In these cases, leadership functions need to be shifted to the team itself, so members with specific expertise can drive problem-solving in various areas.. *TRAVEL*Which of the following is a concern when using your Government-issued laptop in public? The state may verify the information. *SOCIAL NETWORKING*When is the safest time to post details of your vacation activities on your social networking profile? tamarack etc. Simplify the expressions with all exponents positive. Which of the following is an appropriate course of action while formulating job descriptions? In the U.S., interest in telework spiked following the events of 9/11 and the anthrax attacks that soon followed, which forced several key government offices to close. Contact the IRS using their publicly available, official contact information. Drawbacks included social and professional isolation, fewer opportunities for information sharing and a blurring of boundaries between work and personal life (Allen, T.D., et al., Psychological Science in the Public Interest, Vol. Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? Insiders are given a level of trust and have authorized access to Government information systems. 2, 2014), employee engagement (Masuda, A.D., et al., Career Development International, Vol. Depending on the sensitivity of the information being handled, the home office may need to include security measures such as locked file cabinets, similar to what may be used at the official worksite. *SpillageAfter reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Diffusion Let us complete them for you. *Malicious CodeWhat are some examples of malicious code? Often, managers use busyness, working late or other proxies to infer that an employee is effective, says Jeanne Wilson, PhD, a professor of organizational behavior at the College of William & Mary in Williamsburg, Virginia. As our readers might expect, new guidance from the Department of Labor and recent . D. _____ refers to the option given to employees to work away from a centrally located office. What should you do to protect yourself while on social networks? Which of the following is true of telework? A) The U.S. workforce is becoming older, and younger workers are more educated B) The U.S. workforce is becoming younger, and younger workers are more educated C) The U.S. workforce is becoming younger, and older workers are more educated According to Herzbergs two-factor theory, which of the following factors would motivate individuals the most? Which of the following is true of Internet hoaxes? With regard to COOP, note that Emergency Relocation Group (ERG) members must be prepared to telework at any time. Verified answer. At that time, you may be eligible to continue to telework or work remotely two or more days a pay period consistent with the Census Bureau's flexible telework and remote work policies and approval from your supervisor. D. SSN, date and place of birth, mothers maiden name, biometric records, PHI, passport number, Subset of PII, health information that identifies the individual, relates to physical or mental health of an individual, provision of health care to an individual, or payment of healthcare for individual. Which of these $100 face value one-year bonds will have the highest yield to maturity and why? Employees whose jobs require concentration or significant problem-solving often need focused time to think deeply about the task at hand, Golden says. *SpillageWhat is a proper response if spillage occurs? In a remote work situation, managers must rely more heavily on results. Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. You are leaving the building where you work. The Federal Government is a leader in the use of innovative workplace arrangements like telework. Is it okay to run it? You can email your employees information to yourself so you can work on it this weekend and go home now. *Sensitive InformationUnder which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? -Looking for "https" in the URL. What type of attack might this be? Workers tend to work alone at highly specialized jobs. What other steps should I take before I leave my office (e.g., forwarding the phone)? *Sensitive InformationWhich of the following is the best example of Personally Identifiable Information (PII)? Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? The strength of Answer computing and the growth of the mobile digital platform allow organizations to rely more on telework, remote work, and distributed decision making. Neither confirm or deny the information is classified. (32)2. Prepare a new job description whenever a new job is created in the organization. -You must have your organization's permission to telework. **Insider ThreatA colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. **Classified DataWhat is required for an individual to access classified data? **TravelWhat is a best practice while traveling with mobile computing devices? What is the best course of action? Which of the following is a security best practice when using social networking sites? Which method would be the BEST way to . 1, 2010). -Ask them to verify their name and office number Summary: The work schedule for this position is: Full Time (40 hours per week) Start date: Candidate must be able to begin working within a reasonable period of time (6 weeks) of receipt of agency authorization and/or clearances/certifications or their candidacy may end. Which of the following is NOT a criterion used to grant an individual access to classified data? Which of these is true of unclassified data?-Its classification level may rise when aggregated. Which of the following is an example of malicious code? Which of the following is NOT a security best practice when saving cookies to a hard drive? The information that I provide while filling out this online employment application form and completing the application process, including possibly sensitive data, will be transferred online, stored, and processed on a server in the United States of America. You receive an unexpected email from a friend: I think youll like this: https://tinyurl.com/2fcbvy. What action should you take? Discuss the difference. **Social NetworkingWhen is the safest time to post details of your vacation activities on your social networking website? 1 Answer 0 votes answered by admic (1.0m points) selected by voice Best answer You must have your organization's permission to telework b. Never allow sensitive data on non-Government-issued mobile devices. You must have your organization's permission to telework. Employees who are teleworking should assess the portability of their work and the level of technology available at the remote site as they prepare to telework. **Insider ThreatWhich of the following should be reported as a potential security incident? How many potential insider threat indicators does this employee display? Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. DoD employees are prohibited from using a DoD CAC in card-reader-enabled public devices. A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. The Act requires the successful completion of "an interactive telework training program" for employees prior to entering into a written telework agreement. Retrieve classified documents promptly from printers. This work rule allows employees to work additional hours before or after the time period in order to work the full day. These habits include: For more information, visit theSelf-Assessment & Safety Checklist pages. Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. *Sensitive InformationWhat is the best example of Personally Identifiable Information (PII)? A medium secure password has at least 15 characters and one of the following. You can find your Telework Coordinator, by searching OPM's Telework Contact Tool. Based on the description that follows, how many potetntial insider threat indicator(s) are displayed? CUI may be stored on any password-protected system. *MALICIOUS CODE*Which of the following is NOT a way malicious code spreads? The SDC provides the RSO with timely analysis of notable events and receives daily reports, which she/he is responsible for analyzing, translating, and inputting daily data into the Security Incident Management and Analysis System (SIMAS). In addition to formally exploring any cultural or ideological differences, collaborators should also consider how such teams are led. Some early adoptersincluding Best Buy, IBM and Yahooare even reversing policies that once allowed employees to telecommute, citing leadership changes and a growing need for creative collaboration. -When using a public device with a card reader, only use your DoD CAC to access unclassified information, Thumb drives, memory sticks, and flash drives are examples of. How many potential insider threat indicators does this employee display? You believe that you are a victim of identity theft. No. Which of following is true of protecting classified data? In a study of 733 work relationships among colleagues from a variety of industries, she found that relationship quality was more closely tied to perceived proximityor relational closenessthan it was to physical proximity (OLeary, M.B., et al., MIS Quarterly, Vol. Store it in a shielded sleeve to avoid chip cloning. She comes across an advertisement in a newspaper seeking applications for the post of an HR manager. Which is NOT a wireless security practice? For the current COVID-19 Requirements please visit the following link. However, there doesn't always have to be one correct answer. For the current COVID-19 Requirements please visit the following link. Determine if the software or service is authorized. When checking in at the airline counter for a business trip. The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. Always use DoD PKI tokens within their designated classification level. -Delete email from senders you do not know. What action should you take first? Which of the following is NOT a way that malicious code spreads? The Corporate Transparency Act (CTA) was enacted to prevent money laundering and promote a "know your customer" policy by imposing new disclosure requirements on "reporting companies." As long as the document is cleared for public release, you may share it outside of DoD. National Research Council, Enhancing the Effectiveness of Team Science, National Academies Press, 2015, Virtual Teams: Conceptualization, Integrative Review and Research Recommendations *INSIDER THREAT*What threat do insiders with authorized access to information or information systems pose? How many indicators does this employee display? Trust among team members starts lower in virtual teams than in face-to-face teams, but over time, it can build to the same levels, she says. What should you do? Duties. Your comments are due on Monday. How does verbalizing an attitude make it more likely that the attitude will guide your behavior? What should you do? Use a single, complex password for your system and application logons. -If aggregated, the classification of the information may not be changed. Which of the following is NOT an example of CUI? Quickly and professionally. If you are interested in teleworking, or already telework but want to ensure you become a more effective teleworker, here are the key steps to success. Job descriptions generally contain all of the following components EXCEPT _____. *UNCONTROLLED CLASSIFIED INFORMATION*Which of the following is NOT a correct way to protect CUI? CUI may be stored on any password-protected system. Which of the following refers to a list of the tasks, duties, and responsibilities that a job entails? Software that install itself without the user's knowledge. Telecommuting supports the strategy of corporate social responsibility by reducing the employees need to commute by vehicles. Which of the following is NOT a DoD special requirement for tokens? The potential for unauthorized viewing of work-related information displayed on your screen. -It is inherently not a secure technology. 34, No. *SpillageWhat should you do if a reporter asks you about potentially classified information on the web? If possible, set your browser preferences to prompt you each time a website wants to store a cookie. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Once permitted to return to the office building, you will be expected to do so within 30 calendar days of receiving notification. Which of the following may be helpful to prevent inadvertent spillage? *Sensitive Compartmented InformationWhen should documents be marked within a Sensitive Compartmented Information Facility (SCIF), ~All documents should be appropriately marked, regardless of format, sensitivity, or classification.Unclassified documents do not need to be marked as a SCIF.Only paper documents that are in open storage need to be marked.Only documents that are classified Secret, Top Secret, or SCI require marking. C. PAQ ratings cannot be used to compare dissimilar jobs. A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. *MOBILE DEVICES*Which of the following is an example of removable media? Use TinyURLs preview feature to investigate where the link leads. A coworker removes sensitive information without authorization. What is a valid response when identity theft occurs? What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? When leaving your work area, what is the first thing you should do? Examples include but are not limited to the following: 1) an employee has a short-term need *Sensitive Compartmented InformationWhich of the following best describes the compromise of Sensitive Compartmented Information (SCI)? Which of the following demonstrates proper protection of mobile devices? A results-oriented performance culture system focuses on having a diverse, results-oriented, high-performing workforce, as well as a performance management system that effectively plans, monitors, develops, rates, and rewards employee performance. Which of the following is true about telework? They are the most difficult to implement for people in managerial or professional jobs. Which of the following is a good practice to prevent spillage? Accounting is "an information system that identifies, records, and communicates the economic events of an organization to interested users." Instructions Categorize the accounting tasks performed by Genesis as relating to either the identification (I), recording (R), or communication (C) aspects of accounting. For some, operating from a co-working spacea shared office that provides telecommuters and freelancers with internet access, meeting rooms and other amenitiescan help address social isolation. **Identity ManagementYour DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? Designing jobs that meet mental capabilities and limitations generally involves _____. Required. Should you always label your removable media? What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? In another example of research-informed telecommuting, Kaila Jacoby, a consultant with a masters degree in I/O psychology, leads a work-from-home task force at DCI Consulting, a human resources risk-management consulting firm in Washington, D.C. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complain about the credit card bills that his wife runs up. If your organization allows it. The Telework Enhancement Act defines telework or teleworking as a work flexibility arrangement under which an employee performs the duties and responsibilities of such employee's position, and other authorized activities, from an approved worksite other than the location from which the employee would otherwise work. Which of the following is true about telework? Study the diagram of the hemispheres on page 20 . Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Jane JonesSocial security number: 123-45-6789, Select the information on the data sheet that is protected health information (PHI). How many potential insiders threat . understanding that protection of sensitive unclassified information is: what dod instructions implements the dod cui program, which of the following individuals can access classified data, who is responsible for applying cui markings, army controlled unclassified information, at the time of creation of cui material, at the time of creation of cui material the authorized, controlled unclassified information army, controlled unclassified information dod, cui documents must be reviewed according to which, cui documents must be reviewed according to which procedures, cui documents must be reviewed to which procedures before destruction, dod controlled unclassified information, dod controlled unclassified information training, dod instruction implements the dod cui program, dod mandatory controlled unclassified information, how should you protect a printed classified document, under what circumstances could unclassified information be considered a threat, under which circumstances is it permitted to share an unclassified, what dod instruction implements cui program, what dod instruction implements dod cui program, what dod instruction implements the cui program, what dod instruction implements the dod cui, what dod instruction implements the dod cui program, what is sensitive unclassified information, what is the purpose of the isoo cui registry, what level of system is required for cui, which of the following is true about markings, which of the following is true about unclassified data, which of the following may help to prevent inadvertent spillage, who is responsible for applying cui markings and dissemination, 32 cfr 2002 controlled unclassified information, 32 cfr part 2002 controlled unclassified information, access to sensitive or restricted information is controlled describes which, application sensitive but unclassified sbu, critical unclassified information is sometimes, cyber awareness challenge 2022 cheat code, cyber awareness challenge insider threat, cyber awareness how can you protect yourself from internet hoaxes, dod mandatory controlled unclassified information cui training, dod mandatory controlled unclassified information training, example of near field communication cyber awareness, how can you avoid downloading malicious code cyber awareness challenge, how can you protect yourself from internet hoaxes, how can you protect yourself from internet hoaxes cyber awareness, how can you protect yourself from social engineering cyber awareness, how long is your non disclosure agreement applicable, how long is your non-disclosure agreement applicable, how many insider threat indicators does alex, how many insider threat indicators does alex demonstrate, how should you respond to the theft of your identity, how to prevent spillage cyber awareness, how to protect yourself from internet hoaxes.