Which of the following should you do immediately? Computer programmers, travel agents and tech support personnel only need a telephone and a computer with internet access to do . What action should you take first? *Sensitive InformationUnder which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? But the onus for making remote work a success does not fall solely on employers. *MOBILE DEVICES*Which of the following is an example of removable media? 1, 2010). Which of following is true of protecting classified data? Which of the following actions is appropriate after finding classified information on the Internet? Let us have a look at your work and suggest how to improve it! **Identity ManagementWhich of the following is the nest description of two-factor authentication? Which of the following definitions is true about disclosure of confidential information? (Correct) -It does not affect the safety of Government missions. Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Discuss the difference. What should you do to protect classified data? 38, No. In the U.S., interest in telework spiked following the events of 9/11 and the anthrax attacks that soon followed, which forced several key government offices to close. Home Flashcards DOD Cyber Awareness Challenge 2019. What action should you take first? (2019, October 1). The email has an attachment whose name contains the word "secret". You must have your organization's permission to telework. At 0.05 level of significance, test whether there is any difference between the means of two populations. Alert box notification is currently enabled, please, Official Website of the U.S. Office of Personnel Management, follow this link to enable alert boxes for your session profile, follow this link to disable alert boxes for your session profile, Telework Managing Officers & Coordinators, Virtual Telework Fundamentals Training Courses, Telework and Performance Management Webcast Trainings, Enhancing Workplace Flexibilities and Work-Life Programs. The strength of Answer computing and the growth of the mobile digital platform allow organizations to rely more on telework, remote work, and distributed decision making. You receive an unexpected email from a friend: "I think youll like this: (URL)" What action should you take? Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. **Mobile DevicesWhich of the following helps protect data on your personal mobile devices? [ 8.3.3 - Identify threats and attacks to an acquisition program life cycle . e. finding children who were struggling academically. Which of the following best describes job sharing? Still, he says, companies that offer telework arrangements strategicallyby making it contingent upon hitting performance targets, for instancemay be able to avoid such pitfalls. A work option in which two part-time employees carry out the tasks associated with a single job. Trust among team members starts lower in virtual teams than in face-to-face teams, but over time, it can build to the same levels, she says. You have reached the office door to exit your controlled area. Which of the following is NOT Protected Health Information (PHI)? We are a customer driven technology division that provides innovative solutions that connects people and simplifies work. -TRUE What action is recommended when somebody calls you to inquire about your work environment or specific account information? A coworker has asked if you want to download a programmer's game to play at work. Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. *Sensitive Compartmented InformationWhich must be approved and signed by a cognizant Original Classification Authority (OCA)? You can email your employees information to yourself so you can work on it this weekend and go home now. **Website UseWhile you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. According to Herzbergs two-factor theory, which of the following factors would motivate individuals the most? A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. Which of the following demonstrates proper protection of mobile devices? Which of the following is NOT a DoD special requirement for tokens? In a remote work situation, managers must rely more heavily on results. Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. **Insider ThreatA colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited? 6, 2007). which of the following is true of telework An insider threat uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions resulting in loss or degradation of resources or capabilities. A telework arrangement is generally difficult to set up for _____. If you are an annuitant, please contact the Retirement Office during Open Season via one of the following methods: Using Open Season Express by calling 1-800-332-9798. A) They are only provided for employees who hold key strategic positions in a company B) They are the casiest to set up for manufacturing workers. It all depends on the context.. Immediately notify your security point of contact. Despite the largely positive findings on the benefits of telecommuting, just 7% of American companies offer the option to most or all of their employees, according to recent BLS data. FROM THE CREATORS OF. Never allow sensitive data on non-Government-issued mobile devices. Her badge is not visible to you. Teams with a strong group identityfor instance, those that have unified against a competing team or organizationtend to have more perceived proximity, Wilson says. The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. Cyber Awareness Challenge Complete Questions and Answers. In a study of 733 work relationships among colleagues from a variety of industries, she found that relationship quality was more closely tied to perceived proximityor relational closenessthan it was to physical proximity (OLeary, M.B., et al., MIS Quarterly, Vol. Digital Nomads: The Final Frontier of Work Arrangements. What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? Which of the following is true about telework? Employees should consider the following factors in making an honest determination about their telework capabilities: Additionally, to be a successful teleworker you need to have work habits that support independent task performance. How many potential insider threat indicators does this employee display? In the Job Characteristics Model, task identity is defined as the _____. A man you do not know is trying to look at your Government-issued phone and has asked to use it. No. *Sensitive InformationWhat type of unclassified material should always be marked with a special handling caveat? Which of the following is a best practice for physical security? Its time for organizations to move beyond seeing it as a family-friendly work arrangement. In many cases this is true. (32)2. -Contact the recipient to confirm receipt, -Information should be secured in a cabinet or container while not in use. Which of the following is a practice that helps to protect you from identity theft? Which of the following is NOT a way that malicious code spreads? You check your bank statement and see several debits you did not authorize. Interestingly, the growing popularity of remote work could end up dampening its benefits, suggests research by Gajendran. Additionally, when employees are happy, the . The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. You are leaving the building where you work. On a NIPRNET system while using it for a PKI-required task. -Following instructions from verified personnel. You receive an unexpected email from a friend: "I think you'll like this: (URL)" What action should you take? -Senior government personnel, military or civilian. If authorized, what can be done on a work computer? Answers: Apples, pears, oranges, bananas. For more information, please consult your agency telework policy and/or Telework Coordinator. Summary: The work schedule for this position is: Full Time (40 hours per week) Start date: Candidate must be able to begin working within a reasonable period of time (6 weeks) of receipt of agency authorization and/or clearances/certifications or their candidacy may end. What information most likely presents a security risk on your personal social networking profile? Ask for information about the website, including the URL. One can be at the same time appreciative of the need to include what to do under a threat of violence in employee training and viscerally opposed to the kind of active shooter drills that are currently en vogue. 62, No. Store classified data appropriately in a GSA-approved vault/container. For the current COVID-19 Requirements please visit the following link. Which of the following is NOT a home security best practice? Carl Borden, the manager of an electronics store in California, gives his staff the authority to resolve customer complaints. the details of pay and benefits attached to the job. whether the employee is expected to work during agency closures or other Continuity of Operations (COOP) related emergencies or situations that may result in a disruption to normal office operations). They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. Telecommuting is a management tool just like any other, Gajendran says. Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Jane JonesSocial security number: 123-45-6789, Select the information on the data sheet that is protected health information (PHI). To secure IoT devices: Examine the default security options available Enable any security features Set a robust password at the device's maximum length, if possible Specifically, we focus on leaders who manage team members based in remote sites and/or telework one or more days each week. Tuesday, February 28, 2023. Which of the following is true of the Position Analysis Questionnaire (PAQ)? A coworker brings a personal electronic device into prohibited areas. What should the participants in this conversation involving SCI do differently? Which of the following is NOT a good way to protect your identity? Since the URL does not start with https, do not provide you credit card information. Media containing Privacy Act information, PII, and PHI is not required to be labeled. And you can ask questions on the content site through the word "Ask a question" at the . Identify the job design method implemented at Tech-Marketing. Retrieve classified documents promptly from printers. Traumatic Brain Injury (TBI) Awareness for Deploying Leaders and Commanders CBT Questions and Answers. When teleworking, you should always use authorized and software. Who can be permitted access to classified data? He found that when telecommuting is less common at a company, employees tend to perform best when they work primarily remotely. Using webmail may bypass built in security features. Bob, a coworker, has been going through a divorce, has financial difficulties and is displaying hostile behavior. Telework Eligible: No For More Info: HR Section 000-000-0000 jobs.usembassy.be@state.gov Overview Hiring Path: Open to the public . 16, No. . Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Which of the following is a security best practice when using social networking sites? Before long she has also purchased shoes from several other websites. 4, 2014). As a security best practice, what should you do before exiting? The parameters of this agreement are most often laid out by the agency policy and/or collective bargaining agreement but should include the following key elements: The manager and teleworker should work together to periodically evaluate the arrangement, make changes to the agreement as necessary, and re-sign the document. Which method would be the BEST way to send this information? 2, 2015). -It must be released to the public immediately. Store it in a shielded sleeve to avoid chip cloning. Since the URL does not start with https, do not provide your credit card information. And because teleworkers cant make social connections during watercooler chats, Jacoby also suggests alternative ways to support staff relationship-building, including online message boards and small stipends for virtual lunch or coffee dates. Telework Eligible: No For More Info: NMassinguenj 840958473 massinguenj@state.gov Overview Hiring Path: Open to the public Who May Apply/Clarification From the Agency: All . When vacation is over, after you have returned home. As long as the document is cleared for public release, you may share it outside of DoD. B. Which is an untrue statement about unclassified data? Questions that popped up because I incorrectly answered the Knowledge Check. *HOME COMPUTER SECURITY*Which of the following is a best practice for securing your home computer? On a NIPRNet system while using it for a PKI-required task. **Identity managementWhat is the best way to protect your Common Access Card (CAC)? What information posted publicly on your personal social networking profile represents a security risk? Which of the following is NOT a requirement for telework? Preferred formal educational background in one of the following: Business Administration, Project Management, Information Systems Management, National Security Studies, Computer Science, or . How are Trojan horses, worms, and malicious scripts spread? Which of these is true of unclassified data? Of course, some jobs are better suited to remote work than others. Additionally the National Archives & Records Administration provides guidance to agencies and their employees that applies to Federal records in a telework environment on NARA's FAQs about Telework. identify the correct and incorrect statements about executive orders. Which of the following is NOT Government computer misuse? Ask the individual to see an identification badge. Which of the following is NOT an appropriate way to protect against inadvertent spillage? The company has collaborated with psychologists at Cornell University, including Bell, to proactively address issues such as employee isolation, and has seen rewards including reduced real estate costs and better talent retention. New interest in learning another language? tamarack etc. 22, No. How are compensating balances reported in financial statements? -Delete email from senders you do not know. 6, 2019). Which of the following attacks target high ranking officials and executives? What should you do after you have ended a call from a reporter asking you to confirm potentially classified information found on the web? *SOCIAL ENGINEERING*How can you protect yourself from social engineering?