Teleworkers also appear to work more. -Make note of any identifying information and the website URL and report it to your security office. Which of the following is NOT a correct way to protect sensitive information? Does OPM provide employee and/or manager training that agencies . Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. Essentially, telecommuting is allowing your full-time or part-time employees to work from home, or anywhere else they prefer, instead of a traditional office environment. answered May 31, 2022 by Haren (305k points) Best answer. Which of the following is true about telework? which of the following is true of telework Interestingly, the growing popularity of remote work could end up dampening its benefits, suggests research by Gajendran. 6 The scope of the work is defined in which phase of the project management? Which of the following is NOT considered a potential insider threat indicator? List (not a written letter of reference) of a minimum of three (3) professional references with complete name, title, organization where he/she works, description of relationship, and with . You are logged on to your unclassified computer and just received an encrypted email from a co-worker. *SENSITIVE COMPARTMENTED INFORMATION*When faxing Sensitive Compartmented Information (SCI), what actions should you take? Which of the following is an invalid guideline for securing telework computers and laptops , per the National Institute of Standards and Technology ( NIST ) Special Publication ( SP ) 800-114 ? Which of the following is a good practice to prevent spillage? The flexibility, balanced work-home life and other benefits of telecommuting ultimately work to improve employee morale. *SpillageAfter reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. *SOCIAL NETWORKING*When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? Of the following, which is NOT a method to protect sensitive information? Verified answer. You should only accept cookies from reputable, trusted websites. Step 1: Know your Telework Managing Officer and Telework Coordinator All agencies must designate a Telework Managing Officer (TMO), who is the agency's primary contact for policy and program questions. You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). The Act requires employees to successfully complete telework training before they can telework. *PHYSICAL SECURITY*At which Cyberspace Protection Condition (CPCON) is the priority focus on critical and essential functions? Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Who can be permitted access to classified data? Verified answer. What action should you take first? -You must have your organization's permission to telework. Health-care company Aetna, for example, has a decade-old remote work program that screens, trains and supports teleworkersa group that now makes up around half of the companys workforce. (Wrong). On a NIPRNet system while using it for a PKI-required task. You can find your Telework Coordinator by searching OPM's Telework Contact Tool. Phishing can be an email with a hyperlink as bait. Even within a specific role, some duties may be well suited to teleworking, while others are better performed in person. Which of the following may be helpful to prevent inadvertent spillage? Which of the following is true about telework? 7 How the project work will be carried out, monitored, and controlled? Your comments are due on Monday. What are some of the potential advantages and disadvantages? Which of the following is NOT an example of CUI? Gajendran and his colleagues found that teleworkers often go above and beyondfor instance, by responding to emails outside of work hoursto demonstrate their organizational commitment (Personnel Psychology, Vol. While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. Follow instructions given only by verified personnel. In an ongoing effort known as the University of Michigan Coworking Project, a team of researchers has used surveys, interviews and participatory observations to show that such spaces can create a sense of community without threatening remote workers prized autonomy (Garrett, L.E., et al., Organization Studies, Vol. Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. *Sensitive Compartmented InformationWhich of the following best describes the compromise of Sensitive Compartmented Information (SCI)? CUI may be stored on any password-protected system. Employers can hire geographically distributed talent and reduce overhead expenses, while employees can gain flexibility, save time, and reduce transportation and some child-care costs. He found that when telecommuting is less common at a company, employees tend to perform best when they work primarily remotely. Which of the following is true of protecting classified data? Store it in a General Services Administration (GSA)-approved vault or container. -Following instructions from verified personnel. * March 3, 2023 at 11:30 pm. What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? But experts say that without firmer boundaries, employees can experience exhaustion and burnout and that such overwork should be discouraged by managers and organizations. 2, 2015). Which of the following is true of telework? The following practices help prevent viruses and the downloading of malicious code except. **Insider ThreatHow many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? What should you do after you have ended a call from a reporter asking you to confirm potentially classified information found on the web? which of the following is true of telework An insider threat uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions resulting in loss or degradation of resources or capabilities. Lock your device screen when not in use and require a password to reactivate. 2003-2023 Chegg Inc. All rights reserved. A coworker brings a personal electronic device into prohibited areas. Remove your security badge after leaving your controlled area or office building. **Insider ThreatWhich of the following should be reported as a potential security incident (in accordance with you Agencys insider threat policy)? Let's not be totally reductive about these things. The U.S. Office of Personnel Management offers online telework training. What action should you take? What is the best course of action? Which of the following is NOT true of traveling overseas with a mobile phone? The information that I provide while filling out this online employment application form and completing the application process, including possibly sensitive data, will be transferred online, stored, and processed on a server in the United States of America. Sensitive information may be stored on any password-protected system. Which of the following is NOT a typical means for spreading malicious code? . How many potential insider threat indicators is Bob displaying? Which of the following is NOT an example of sensitive information? All the . **Insider ThreatHow many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? -Linda encrypts all of the sensitive data on her government-issued mobile devices. Immediately notify your security point of contact. The SDC provides the RSO with timely analysis of notable events and receives daily reports, which she/he is responsible for analyzing, translating, and inputting daily data into the Security Incident Management and Analysis System (SIMAS). Which of the following actions is appropriate after finding classified information on the Internet? Your comments are due on Monday. Companies that have backtracked on remote worksuch as Yahoo and IBMmake headlines because theyre outliers in the general trend toward teleworking, says Bell. -Always use DoD PKI tokens within their designated classification level. D. The Corporate Transparency Act (CTA) was enacted to prevent money laundering and promote a "know your customer" policy by imposing new disclosure requirements on "reporting companies." You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). **Use of GFEUnder what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? Ive tried all the answers and it still tells me off, part 2. PII, PHI, and financial information is classified as what type of information? Which of the following should be reported as a potential security incident? Telecommuting supports the strategy of corporate social responsibility by reducing the employees need to commute by vehicles. A man you do not know is trying to look at your Government-issued phone and has asked to use it. A related line of research is also exploring how to maximize the effectiveness of geographically distributed teams that rely primarily on virtual means of communication. Be aware of classification markings and all handling caveats. How are Trojan horses, worms, and malicious scripts spread? Because you're already amazing. Many workers view telecommuting as a job perk, with more than half seeking the arrangement as a way to improve work-life balance. -Setting weekly time for virus scan when you are not on the computer and it is powered off. As teams become more virtual, it may be impossible for a single person to direct an entire project, Kozlowski says. Which of the following is a practice that helps to protect you from identity theft? softw are Question Not yet answered Marked out of 1.00 Flag question Question text Cell phones, BlackBerrys, iPhones, e-mail, and online conferencing over the Internet have . z To protect the information on your CAC, you should never tell anyone your PIN or write it down where it can be easily found. What should you do if a reporter asks you about potentially classified information on the web? 6, 2007). Record the transaction using debits and credits. Level I Antiterrorism Awareness Training - (2, Cyber Awareness Challenge 2022 Knowledge Check, John David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine, Operations Management: Sustainability and Supply Chain Management, Organizational Behavior: Managing People and Organizations, Jean Phillips, Ricky W. Griffin, Stanley Gully, Patient Care - Infection Control & management. Of the following, which is NOT a characteristic of a phishing attempt? Which of the following is NOT considered sensitive information? A medium secure password has at least 15 characters and one of the following. Employers can hire geographically distributed talent and reduce overhead expenses, while employees can gain flexibility, save time, and reduce transportation and some child-care costs. A. Y is directly proportional to X then, Y = k X, where k is a constant. Which of the following is true about telework? Which type of information includes personal, payroll, medical, and operational information? At that time, you may be eligible to continue to telework or work remotely two or more days a pay period consistent with the Census Bureau's flexible telework and remote work policies and approval from your supervisor. *SpillageWhich of the following is a good practice to aid in preventing spillage? Work with our consultant to learn what to alter. If you are using assistive technology to view web content, please ensure your settings allow for the page content to update after initial load (this is sometimes called "forms mode"). Which of the following should be done to keep your home computer secure? A pop-up window that flashes and warns that your computer is infected with a virus. *SOCIAL ENGINEERING*How can you protect yourself from internet hoaxes? the Telework Enhancement Act of 2010 (the Act). Use a common password for all your system and application logons. Which of the following is not a step in the process of measuring external transactions? A coworker has left an unknown CD on your desk. People who teleworked also tended to experience less work stress or exhaustion. Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. 8 The review of the successes and the mistakes is normally held during _____ phase. Which of the following best describes wireless technology? Along with social isolation, the clouding of work-family boundaries is a significant challenge for remote employees. Which of the following is NOT a correct way to protect CUI? Its classification level may rise when aggregated. Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approves for access to the NIPRNET. It is permissible to release unclassified information to the public prior to being cleared. Using OPM's Open Season Online system. You are leaving the building where you work. *INSIDER THREAT*Based on the description below how many potential insider threat indicators are present? How are compensating balances reported in financial statements? *Sensitive InformationUnder which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? What is the best response if you find classified government data on the internet? A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. Connect to the Government Virtual Private Network (VPN).?? Connect with others, with spontaneous photos and videos, and random live-streaming. -Request the user's full name and phone number. Classified material must be appropriately marked. Never allow sensitive data on non-Government-issued mobile devices. Qualified Offerors must upload the following (4) documents in ERA (Do not upload more documents) or their offers will not be considered for this position: 1. **Classified DataWhich of the following is true of protecting classified data? These updated FAQs were released to the public in Fact Sheet 2022-16 PDF, March 3, 2022.. The Act requires the successful completion of "an interactive telework training program" for employees prior to entering into a written telework agreement. Which of the following is NOT one? Which of the following is NOT a potential insider threat? In the case of emergency telework, what should I have available at all times at my home office that would enable me to be functional without coming onsite to retrieve materials. Be aware of classification markings and all handling caveats. Which of the following is NOT a DoD special requirement for tokens? One analysis showed that the blurring of such boundaries causes remote workers to associate their homes with their work roles as work obligations repeatedly intrude upon family time (Eddleston, K.A., & Mulki, J., Group & Organization Management, Vol. asked May 31, 2022 in Other by Kamal (64.9k points) Which of the following is true about telework? One study found that teams with one large and multiple smaller subgroups tend to develop an ingroup-outgroup mentality and experience more conflict and coordination problems, whereas teams with individual members who are geographically isolated report fewer such problems (OLeary, M.B., & Mortensen, M., Organization Science, Vol. In which hemispheres is Africa located? What information should you avoid posting on social networking sites? HIRING PREFERENCE SELECTION PROCESS: Applicants in the following hiring preference categories are extended a hiring preference in the . By "interactive," does this mean that training must be "instructor-led" or face-to-face rather than via computer? What should be your response? C. They support the strategy of corporate social responsibility by reducing an employee's need to commute using a vehicle. What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure? On a NIPRNET system while using it for a PKI-required task. Which of the following job design techniques does Carl implement in his store? Exceptionally grave damage. Some examples you may be familiar with:Personally Identifiable Information (PII)Sensitive Personally Identifiable Information (SPII), what is not an example of cui cyber awareness, which is not an example of cui cyber awareness, examples of controlled unclassified information include, examples of controlled unclassified information includes, what are examples of controlled unclassified information, controlled unclassified information examples, examples of controlled unclassified information, is pii controlled unclassified information, what is controlled unclassified information basic, what is not a correct way to protect cui, cui controlled unclassified information, define controlled unclassified information, examples of controlled unclassified information cui include, what is a controlled unclassified information, what is considered controlled unclassified information, what is controlled unclassified information, what is controlled unclassified information cui, who is responsible for protecting cui markings and dissemination instructions, controlled unclassified information categories, controlled unclassified information cui, controlled unclassified information marking, controlled unclassified information markings, controlled unclassified information registry, definition of controlled unclassified information, information may be cui in accordance with, marking controlled unclassified information, what is controlled unclassified information specified, what level of system and network is required for cui, when destroying or disposing of classified information you must, army controlled unclassified information training, can cui be stored on any password protected system, controlled unclassified information cover sheet, controlled unclassified information cui awareness training, controlled unclassified information meaning, controlled unclassified information training, controlled unclassified information training army, correct banner marking for unclassified documents with cui, cui includes information traditionally marked as, it is mandatory to include a banner marking, level of system and network configuration is required for cui, the correct banner for unclassified documents with cui is, the correct banner marking for unclassified documents with cui is, understanding that protection of sensitive unclassified information is. Phishing can be an email with a hyperlink as bait. **Social NetworkingWhen is the safest time to post details of your vacation activities on your social networking website? ~A coworker brings a personal electronic device into a prohibited area. This article will provide you with all the questions and answers for Cyber Awareness Challenge. But the impact of such arrangements on productivity, creativity and morale has been . Once permitted to return to the office building, you will be expected to do so within 30 calendar days of receiving notification. National Archives & Records Administration, Sufficient portable work for the amount of telework proposed, Comfort with the technologies, if any, that will be needed to telework, Good communication with your manager, co-workers, customers that will enable a relatively seamless transition from onsite to offsite, Telework office space that is conducive to getting the work done, Dependent care (i.e., child care, elder care, or care of any other dependent adults) arrangements in place, Ability to be flexible about the telework arrangement to respond to the needs of the manager, the workgroup, and the work, Ability to work with minimal direct supervision, Location of the telework office (e.g., home or another alternative workplace), Equipment inventory (e.g., what the employee is supplying, what the agency is providing, and who is responsible to maintain it), A general overview of the type of work that will be performed while teleworking, Telework contact information (e.g., what phone number to use on the telework day). **Physical SecurityAt which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? You receive a call on your work phone and you're asked to participate in a phone survey. How should you protect a printed classified document when it is not in use? Store it in a shielded sleeve to avoid chip cloning. **Insider ThreatWhat type of activity or behavior should be reported as a potential insider threat? What action should you take? The advertisement exclusively highlights requirements such as strong communication skills, excellent teamwork, and leadership skills. Which of the following best describes job sharing? In the context of a work flow analysis, materials, equipment, and human resources needed to perform the tasks collectively constitute the _____. Should you always label your removable media? Employees should maintain frequent contact with their Telework Coordinator to be sure they follow policy and procedures, and for support and assistance should it be needed. **Classified DataWhat is a good practice to protect classified information? **Identity ManagementWhich of the following is the nest description of two-factor authentication? Which of the following is NOT an example of CUI? What should be your response? Study the diagram of the hemispheres on page 20 . jobs. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. WINDOWPANE is the live-streaming app for sharing your life as it happens, without filters, editing, or anything fake. Which of the following is a proper way to secure your CAC/PIV? Classified material must be appropriately marked, everything Friends Only except your Name and Profile Picture - turn off "Check in location via GPS", Cyber Awareness Challenge 2022 Knowledge Check, Annual DoD Cyber Awareness Challenge Training, DOD Cyber Awareness Challenge 2019 (DOD-IAA-V, Cyber Awareness Challenge 2023 (Incomplete), Cyber Awareness Challenge 2021 - Knowledge Ch, Elliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson, Information Technology Project Management: Providing Measurable Organizational Value, Operations Management: Sustainability and Supply Chain Management, Service Management: Operations, Strategy, and Information Technology, Unit 2 Industrialization/Immigration - Review. Accounting is "an information system that identifies, records, and communicates the economic events of an organization to interested users." Instructions Categorize the accounting tasks performed by Genesis as relating to either the identification (I), recording (R), or communication (C) aspects of accounting. What is the result of an organization structure that is strongly based on function? This work rule allows employees to work additional hours before or after the time period in order to work the full day. For analyzing technical skill levels, the best source for job information may be ____, who have vast experience rating a wide range of jobs. d. All of the above are steps in the measurement process of external . if you are a military personnel and you knowingly leaked, information may be cui in accordance with executive order 13526, intentional unauthorized disclosure of classified information, is it permitted to share an unclassified draft document, is press release data sensitive information, is whistleblowing the same as reporting an unauthorized disclosure, near field communication cyber awareness, near field communication cyber awareness 2022, opsec is a dissemination control category, opsec is a dissemination control category within the cui program, penalties for unauthorized disclosure of classified information, relates to reporting of gross mismanagement and/or abuse of authority, requirements to access classified information, the act of publicly documenting and sharing information is called, the whistleblower protection enhancement act relates to reporting, unauthorized disclosure of classified information, unauthorized disclosure of classified information for dod and industry, unauthorized disclosure of information classified as confidential, what can malicious code do cyber awareness challenge, what dod instruction implements the dod program, what is a possible effect of malicious code, what is a possible effect of malicious code cyber awareness, what is a protection against internet hoaxes, what is a protection against internet hoaxes cyber awareness, what is possible effect of malicious code, what is protection against internet hoaxes, what is purpose of the isoo cui registry, what is required for an individual to access classified data, what is sensitive compartmented information cyber awareness 2022, what is the possible effect of malicious code, what is the purpose of isoo cui registry, what is the purpose of the isoo registry, what level of damage can the unauthorized disclosure of information, what security risk does a public wi-fi connection pose, what should the owner of this printed sci do differently, what should you do if you suspect spillage has occurred, what threat do insiders with authorized, what threat do insiders with authorized access to information, what threat do insiders with authorized access to information pose, when can you check personal email on your gfe, when using social networking services the penalties for ignoring requirements, which of the following individuals can access classified data 2022, which of the following is an example of nfc, which of the following is good practice to prevent spillage, which of the following is true about protecting classified data, which of the following is true of protecting classified data, which of the following may help prevent spillage, which of the following may help to prevent spillage, which of the following represents a good physical security practice, which of these is true of unclassified data, whistleblowing should be used to report which of the following, who is responsible for applying cui markings and dissemination instructions.