Work with our consultant to learn what to alter. A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited? Which of the following is NOT a potential insider threat? According to Herzbergs two-factor theory, which of the following factors would motivate individuals the most? By "interactive," does this mean that training must be "instructor-led" or face-to-face rather than via computer? Which of the following is a security best practice when using social networking sites? Your comments are due on Monday. Which of the following is true about telework? Chang invests $500\$ 500$500 in an account that earns 3.5%3.5 \%3.5% compounded annually. Job descriptions generally contain all of the following components EXCEPT _____. -Sanitized information gathered from personnel records. Note any identifying information, such as the websites URL, and report the situation to your security POC. a. Analyze the impact of the transaction on the accounting equation. *SPILLAGE*Which of the following may be helpful to prevent spillage? You have reached the office door to exit your controlled area. In most organizations, telecommuting is not a right; its a privilege that you earn. People who teleworked also tended to experience less work stress or exhaustion. a. A work option in which two part-time employees carry out the tasks associated with a single job. Ive tried all the answers and it still tells me off, part 2. In another example of research-informed telecommuting, Kaila Jacoby, a consultant with a masters degree in I/O psychology, leads a work-from-home task force at DCI Consulting, a human resources risk-management consulting firm in Washington, D.C. As our readers might expect, new guidance from the Department of Labor and recent . In the teleworking sphere, psychologists are confident about a continuing upward trendBell anticipates such growth as businesses aim to attract employees in a tight labor market and as communication technologies become more sophisticatedbut theyre still probing a number of unanswered questions. Study the diagram of the hemispheres on page 20 . What should you do? B. Y is directly proportional to X then, Y = k X, where k is a variable. What should be your response? Which of the following best describes the sources that contribute to your online identity? C. PAQ ratings cannot be used to compare dissimilar jobs. The process of getting detailed information about jobs is known as _____. On a NIPRNet system while using it for a PKI-required task. Based on the description that follows, how many potetntial insider threat indicator(s) are displayed? Connect to the Government Virtual Private Network (VPN). *Sensitive InformationWhich of the following is the best example of Personally Identifiable Information (PII)? Phishing can be an email with a hyperlink as bait. Back to top The following practices help prevent viruses and the downloading of malicious code except. Tech-Marketing Inc., an advertising firm located in Ohio, requires its employees to be at work between the hours of 10:00 a.m. to 3:00 p.m. Before allowing employees to work remotely, organizations should reevaluate policies around performance evaluation, promotion and salary increases to ensure they dont favor on-site workers, she says. Greater physical distances can present logistical concerns when tasks require real-time communicationfor instance, during a military operation. Neither confirm or deny the information is classified. -Classified material must be appropriately marked. Investigate the links actual destination using the preview feature. **Insider ThreatHow many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? -If aggregated, the classification of the information may not be changed. Which of the following is a best practice for handling cookies? In the Job Characteristics Model, task identity is defined as the _____. The email states your account has been compromised and you are invited to click on the link in order to reset your password. What should the owner of this printed SCI do differently? Which of the following is a good practice to prevent spillage? 6, 2007). In another line of research, psychologists are exploring how to maximize the efficiency and productivity of teams that are geographically dispersed. 6 The scope of the work is defined in which phase of the project management? The parameters of this agreement are most often laid out by the agency policy and/or collective bargaining agreement but should include the following key elements: The manager and teleworker should work together to periodically evaluate the arrangement, make changes to the agreement as necessary, and re-sign the document. Which of the following is NOT a social engineering tip? TERMS AND CONDITIONS By creating an account (login and password), I understand and expressly consent to the following:. The information that I provide while filling out this online employment application form and completing the application process, including possibly sensitive data, will be transferred online, stored, and processed on a server in the United States of America. -Delete email from senders you do not know. What should you do? identify the correct and incorrect statements about executive orders. The Surveillance Detection Coordinator (SDC) reports directly to the RSO and provides daily oversight of the SD Program. 34, No. TMOs will often work with a Telework Coordinator on the day-to-day operational aspects of telework. inputs used in the development of the work unit's product. Sensitive information may be stored on any password-protected system. Under DLA policy, a first-line supervisor may be delegated authority to: Approved telework requests. Gajendran and his colleagues found that teleworkers often go above and beyondfor instance, by responding to emails outside of work hoursto demonstrate their organizational commitment (Personnel Psychology, Vol. 1, 2019). Company leaders hesitation around flexible work arrangements is often driven by the fear that performance will suffer if employees arent closely monitored. z To protect the information on your CAC, you should never tell anyone your PIN or write it down where it can be easily found. But a handful of organizations are effectively using research insights to build evidence-based remote work programsand reaping the rewards. Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. It is permissible to release unclassified information to the public prior to being cleared. More than 38% of companies already have a remote office phone system setup, as we learned in our business communication report. Use your own facility access badge or key code. Which of the following is an example of malicious code? In the context of work flow design, a position is _____. Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)? - CUI is an umbrella term that encompasses many different markings to identify information that is not classified but which should be protected. C. Y is indirectly proportional to X then, Y = k X, where k is a constant. *MALICIOUS CODE*Which of the following is NOT a way malicious code spreads? 1) Which of the following statements about the U.S. workforce is true? They can be fully or partially remote; they may work from a home office, co-working space or other location; and increasingly they may be geographically distant from the organization or clients they serve. You receive an email from a company you have an account with. Which of the following is NOT a typical result from running malicious code? For more information, please consult your agency telework policy and/or Telework Coordinator. What should you do? Which of the following makes Alex's personal information vulnerable to attacks by identity thieves? -Personal information is inadvertently posted at a website. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Job enrichment differs from job rotation in that job enrichment: empowers workers by adding more decision-making authority to their jobs. DoD employees are prohibited from using a DoD CAC in card-reader-enabled public devices. Which of the following is true about telework? The Telework Enhancement Act defines telework or teleworking as a work flexibility arrangement under which an employee performs the duties and responsibilities of such employee's position, and other authorized activities, from an approved worksite other than the location from which the employee would otherwise work. (32)2. What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited? *INSIDER THREAT*Which of the following is NOT considered a potential insider threat indicator? . . Which of the following is true about telework? Which of the following is NOT a security best practice when saving cookies to a hard drive? Be aware of classification markings and all handling caveats. -Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. b. identifying those who might be wasting their talents and not taking school seriously. A man you do not know is trying to look at your Government-issued phone and has asked to use it. Is it okay to run it? -Setting weekly time for virus scan when you are not on the computer and it is powered off. Using OPM's Open Season Online system. b. You can email your employees information to yourself so you can work on it this weekend and go home now. New interest in learning a foregin language. Answer The answer will depend largely on the requirements of your individual agency, the agency telework policy, and your manager. Telework can give employees more control over their schedules and flexibility in meeting personal and professional responsibilities. Which of the following should you do immediately? And such remote work can benefit both employers and employees, experts say. B. PAQ reports provide concrete recommendations useful for writing job descriptions or redesigning jobs. d. evaluating the quality of French schools. Which of the following is true of Internet hoaxes? B. And such remote work can benefit both employers and employees, experts say. What should you do? You should only accept cookies from reputable, trusted websites. -You must have your organization's permission to telework. Immediately notify your security point of contact. It considers only the inputs of a work process, ignoring the outputs. -Make note of any identifying information and the website URL and report it to your security office. **Insider ThreatA colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. tamarack etc. When done well, remote work has the potential to improve performance, increase employee satisfaction and benefit a business., Supporting Virtual Collaborations Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? degree to which a job requires completing a whole piece of work from beginning to end. *Sensitive Compartmented InformationWhat is a Sensitive Compartmented Information (SCI) program? In a survey his team conducted, nearly all companies interviewed said they intend to continue offering teleworking or expand its use in the future (Workplace Redesign: Current Trends, Challenges, and Opportunities, CAHRS White Paper, 2019). 62, No. Which of the following is true of telework? If you participate in or condone it at any time. Which of the following actions is appropriate after finding classified information on the Internet? A related line of research is also exploring how to maximize the effectiveness of geographically distributed teams that rely primarily on virtual means of communication. -After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. Should you always label your removable media? -Remove and take it with you whenever you leave your workstation. Box 5000 Lawrence, KS 66046-0500 The following pairs of investment plan are identical except for a small difference in interest rates. Which of the following HR activities is similar to analyzing a job that does not yet exist? Which of the following is true of the International Organization for Standardization? **Home Computer SecurityHow can you protect your information when using wireless technology? At the personal level, team members who disclose personal information, such as a favorite television show or the birth of a child, also build stronger connections and more trust. Which method would be the BEST way to . If authorized, what can be done on a work computer? Label all files, removable media, and subject headers with appropriate classification markings. **Identity managementWhich is NOT a sufficient way to protect your identity? Examples include but are not limited to the following: 1) an employee has a short-term need *Sensitive Compartmented InformationWhich of the following best describes the compromise of Sensitive Compartmented Information (SCI)? If your organization allows it. In which situation below are you permitted to use your PKI token? (b) Explain the rationale for the use of the lower-of . Let us have a look at your work and suggest how to improve it! New interest in learning a foreign language. Simplify the expressions with all exponents positive. This bag contains your government-issued laptop. **Website UseWhile you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. Get a Consultant. When teleworking, you should always use authorized and software. "Telework is a work arrangement that allows an employee to perform work during any part of regular, paid hours, at an approved alternative worksite (e.g., home or telework center). Diffusion Let us complete them for you. What should you do? All https sites are legitimate and there is no risk to entering your personal info online. Which of the following is true about telework? Jacoby, K.S., & Holland, S., In The Bridge: Connecting Science and Practice Society for Industrial and Organizational Psychology, Jan. 4, 2019, SIOP White Paper Series: Telecommuting In a shared office full of potential interruptions, that can be hard to do.. As long as the document is cleared for public release, you may release it outside of DoD. CUI may be stored on any password-protected system. Employees must take responsibility for the security of the data and other information they handle while teleworking. What action should you take? At that time, you may be eligible to continue to telework or work remotely two or more days a pay period consistent with the Census Bureau's flexible telework and remote work policies and approval from your supervisor. (23)2\left(\frac{2}{3}\right)^{-2} You must have your organization's permission to telework. In setting up your personal social networking service account, what email address should you use? How many indicators does this employee display? What should be your response? *HOME COMPUTER SECURITY*Which of the following is a best practice for securing your home computer? Team members usually share work assignments. -Carrying his Social Security Card with him. Its not so much that telecommuting is good or bad; its just that sometimes its advantageous and sometimes its not, Gajendran says. 92, No. **Mobile DevicesWhich of the following helps protect data on your personal mobile devices? And you can ask questions on the content site through the word "Ask a question" at the . What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? Store it in a shielded sleeve to avoid chip cloning. Verified answer. What should be your response? *Sensitive Compartmented InformationWhen should documents be marked within a Sensitive Compartmented Information Facility (SCIF), ~All documents should be appropriately marked, regardless of format, sensitivity, or classification.Unclassified documents do not need to be marked as a SCIF.Only paper documents that are in open storage need to be marked.Only documents that are classified Secret, Top Secret, or SCI require marking. Which of the following should be reported as a potential security incident (in accordance with your Agencys insider threat policy)? If possible, set your browser preferences to prompt you each time a website wants to store a cookie. Use TinyURLs preview feature to investigate where the link leads. 2003-2023 Chegg Inc. All rights reserved. A medium secure password has at least 15 characters and one of the following. Sensitive information may be stored on any password-protected system. a person receives clear information about performance effectiveness from the work itself. Spillage because classified data was moved to a lower classification level system without authorization. Which of the following is NOT a criterion used to grant an individual access to classified data? Which of following is true of protecting classified data? *Sensitive InformationWhat type of unclassified material should always be marked with a special handling caveat? -Connect to the Government Virtual Private Network (VPN).?? How many potential insiders threat indicators does this employee display?