Array

which of the following is true about telework
which of the following is true about telework
What should you do? 16, No. You can email your employees information to yourself so you can work on it this weekend and go home now. Which of the following refers to a list of the tasks, duties, and responsibilities that a job entails? Use online sites to confirm or expose potential hoaxes. A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. 1 Answer. Depending on the sensitivity of the information being handled, the home office may need to include security measures such as locked file cabinets, similar to what may be used at the official worksite. The flexibility, balanced work-home life and other benefits of telecommuting ultimately work to improve employee morale. But the impact of such arrangements on productivity, creativity and morale has been . Using OPM's Open Season Online system. c. Interpret the results in (a) and (b). What should you do if a reporter asks you about potentially classified information on the web? Compute the balances in both accounts after 101010 and 303030 years. **TravelWhat is a best practice while traveling with mobile computing devices? -Use TinyURL's preview feature to investigate where the link leads. A coworker has left an unknown CD on your desk. What should you do? softw are Question Not yet answered Marked out of 1.00 Flag question Question text Cell phones, BlackBerrys, iPhones, e-mail, and online conferencing over the Internet have . How are Trojan horses, worms, and malicious scripts spread? The following pairs of investment plan are identical except for a small difference in interest rates. You can find your Telework Coordinator, by searching OPM's Telework Contact Tool. Reducing the physical strain on employees performing the job. Use the classified network for all work, including unclassified work. Which method would be the BEST way to . d. All of the above are steps in the measurement process of external . What is NOT Personally Identifiable Information (PII)? B. PAQ reports provide concrete recommendations useful for writing job descriptions or redesigning jobs. What can you do to protect yourself against phishing? Which of the following is NOT an appropriate way to protect against inadvertent spillage? Never allow sensitive data on non-Government-issued mobile devices. Which of the following should you NOT do if you find classified information on the internet? Which of the following is a practice that helps to protect you from identity theft? *USE OF GFE*What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? As our readers might expect, new guidance from the Department of Labor and recent . 7 How the project work will be carried out, monitored, and controlled? Which of the following is a best practice for handling cookies? Which of the following best describes wireless technology? The email provides a website and a toll-free number where you can make payment. -TRUE The use of webmail is -is only allowed if the organization permits it Using webmail may bypass built in security features. Companies should never just implement telecommuting without changing anything else, says I/O psychologist Kristen Shockley, PhD, an associate professor at the University of Georgia. Which of the following HR activities is similar to analyzing a job that does not yet exist? Simplify the expressions with all exponents positive. Team members usually share work assignments. A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. Of the following, which is NOT a method to protect sensitive information? **Insider ThreatWhat type of activity or behavior should be reported as a potential insider threat? Which of the following is a best practice for handling cookies? -Make note of any identifying information and the website URL and report it to your security office. Remove your security badge after leaving your controlled area or office building. What should you do to protect classified data? Which of the following is NOT Government computer misuse? TPWD MISSION To manage and conserve the natural and cultural resources of Texas and to provide hunting, fishing and outdoor recreation opportunities for the use and enjoyment of present and future . Those workers tend to be older, more educated, full time and nonunion. *SOCIAL ENGINEERING*How can you protect yourself from internet hoaxes? Immediately notify your security point of contact. It is a worldwide federation of national standards bodies from 161 countries The OLPC XO-4 runs a Windows-based operating system FALSE A successful defense against a product liability case is typically expensive in terms of legal fees TRUE Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? Your comments are due on Monday. **Social EngineeringWhich of the following is a way to protect against social engineering? On the one hand, family and social obligations can easily bleed over into work hours. Use TinyURLs preview feature to investigate where the link leads. 2, 2014), employee engagement (Masuda, A.D., et al., Career Development International, Vol. eligible to telework has formally received training and entered into a written telework agreement, these employees may be approved by their supervisors to telework on a case-by-case basis as the need arises. How many potential insiders threat . People choose to work remotely to avoid daily commutes, reduce workplace distractions and fulfill family care responsibilities (Owl Labs State of Remote Work, 2017). Which of the following should be reported as a potential security incident (in accordance with your Agencys insider threat policy)? *MOBILE DEVICES*Which of the following is an example of removable media? Get IT support Teleworkers are dependent on fast, reliable, consistent connections. Which of the following does NOT constitute spillage? We are a customer driven technology division that provides innovative solutions that connects people and simplifies work. What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? Who needs to be notified that I will be teleworking? Despite the largely positive findings on the benefits of telecommuting, just 7% of American companies offer the option to most or all of their employees, according to recent BLS data. Quickly and professionally. You are working at your unclassified system and receive an email from a coworker containing a classified attachment. What should you do? Which of the following is NOT a DoD special requirement for tokens? New interest in learning another language? For more information, please consult your agency telework policy and/or Telework Coordinator. What is a possible indication of a malicious code attack in progress? c. Post the transaction to the T-account in the general ledger. Telecommuting supports the strategy of corporate social responsibility by reducing the employees need to commute by vehicles. 6, 2017). What should be your response? The Telework Enhancement Act defines telework or teleworking as a work flexibility arrangement under which an employee performs the duties and responsibilities of such employee's position, and other authorized activities, from an approved worksite other than the location from which the employee would otherwise work. Software that install itself without the user's knowledge. You should only accept cookies from reputable, trusted websites. Ask for information about the website, including the URL. (Correct) -It does not affect the safety of Government missions. -Use the government email system so you can encrypt the information and open the email on your government issued laptop. What action should you take first? Upon connecting your Government- issued laptop to a public wireless connection, what should you immediately do? C. Y is indirectly proportional to X then, Y = k X, where k is a constant. How many potential insider threat indicators is Bob displaying? National Archives & Records Administration, Sufficient portable work for the amount of telework proposed, Comfort with the technologies, if any, that will be needed to telework, Good communication with your manager, co-workers, customers that will enable a relatively seamless transition from onsite to offsite, Telework office space that is conducive to getting the work done, Dependent care (i.e., child care, elder care, or care of any other dependent adults) arrangements in place, Ability to be flexible about the telework arrangement to respond to the needs of the manager, the workgroup, and the work, Ability to work with minimal direct supervision, Location of the telework office (e.g., home or another alternative workplace), Equipment inventory (e.g., what the employee is supplying, what the agency is providing, and who is responsible to maintain it), A general overview of the type of work that will be performed while teleworking, Telework contact information (e.g., what phone number to use on the telework day). Of the following, which is NOT a characteristic of a phishing attempt? Greater physical distances can present logistical concerns when tasks require real-time communicationfor instance, during a military operation. How does verbalizing an attitude make it more likely that the attitude will guide your behavior? An employee can write reports or articles from a home office, but interpersonally sensitive tasks that may involve nonverbal communicationconducting a quarterly performance review with a subordinate, for exampletend to go more smoothly when handled face to face, says Golden. Researchers already know a lot about how to coordinate behavior and motivate people working in face-to-face teams, says Kozlowski. List (not a written letter of reference) of a minimum of three (3) professional references with complete name, title, organization where he/she works, description of relationship, and with . Spear Phishing attacks commonly attempt to impersonate email from trusted entities. What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? Under DLA policy, a first-line supervisor may be delegated authority to: Approved telework requests. What is an indication that malicious code is running on your system? Which of the following is NOT a correct way to protect CUI? The process of getting detailed information about jobs is known as _____. -Request the user's full name and phone number. Verified answer. -Validate all friend requests through another source before confirming them. 8 The review of the successes and the mistakes is normally held during _____ phase. Use your own facility access badge or key code. Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. What information most likely presents a security risk on your personal social networking profile? -After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. What should you do? If you are using assistive technology to view web content, please ensure your settings allow for the page content to update after initial load (this is sometimes called "forms mode"). A. Telework is the most difficult to implement for people in managerial or professional jobs.B. *PHYSICAL SECURITY*Within a secure area, you see an individual who you do not know and is not wearing a visible badge. **Insider ThreatWhich of the following should be reported as a potential security incident? TMOs will often work with a Telework Coordinator on the day-to-day operational aspects of telework. PII, PHI, and financial information is classified as what type of information? *HOME COMPUTER SECURITY*Which of the following is a best practice for securing your home computer? The Corporate Transparency Act (CTA) was enacted to prevent money laundering and promote a "know your customer" policy by imposing new disclosure requirements on "reporting companies." 6, 2007). But researchers also caution that teleworking is rarely an all-or-nothing arrangement. Health-care company Aetna, for example, has a decade-old remote work program that screens, trains and supports teleworkersa group that now makes up around half of the companys workforce. And such remote work can benefit both employers and employees, experts say. Which of the following is true about knowledge, skills, abilities, and other characteristics (KSAOs) that are required for a job? Report the crime to local law enforcement. What does Personally Identifiable Information (PII) include? When would be a good time to post your vacation location and dates on your social networking website? Traumatic Brain Injury (TBI) Awareness for Deploying Leaders and Commanders CBT Questions and Answers. Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? You are reviewing your employees annual self evaluation. Once permitted to return to the office building, you will be expected to do so within 30 calendar days of receiving notification. question. They play an important role in interviews and selection decisions. D. Y is indirectly proportional to X then, Y = k X, where k is a variable. Which method would be the BEST way to send this information? A coworker has asked if you want to download a programmers game to play at work. Which of the following statements is NOT true about protecting your virtual identity? b. You believe that you are a victim of identity theft. Which of the following best describes job sharing? What type of security is "part of your responsibility" and "placed above all else?". . Decline So That You Maintain Physical Control of Your Government-Issued Laptop. How many potential insiders threat indicators does this employee display? 6, 2019). A related line of research is also exploring how to maximize the effectiveness of geographically distributed teams that rely primarily on virtual means of communication. Get a Consultant. Abrams, Z. In June 2014, President Obama issued a Presidential Memorandum entitled, Enhancing Workplace Flexibilities and Work-Life Programs, as a way to help attract, empower and retain a talented and productive workforce in the 21st century. For more information about agency-based telework training and/or information technology training, please consult your agency Telework Coordinator or TMO. *SOCIAL NETWORKING*Which of the following is a security best practice when using social networking sites? [ 8.3.3 - Identify threats and attacks to an acquisition program life cycle . The research has generally shown that for most outcomes, remote work leads to small but tangible benefits, says I/O psychologist Bradford Bell, PhD, professor and director of the Center for Advanced Human Resource Studies (CAHRS) at Cornell University. Which of the following is a good practice to avoid email viruses? Decline to lend the man your phone. In another line of research, psychologists are exploring how to maximize the efficiency and productivity of teams that are geographically dispersed. What should you do? HIRING PREFERENCE SELECTION PROCESS: Applicants in the following hiring preference categories are extended a hiring preference in the . TMOs will often work with a Telework Coordinator on the day-to-day operational aspects of telework. 2003-2023 Chegg Inc. All rights reserved. **Classified DataWhat is a good practice to protect classified information? CUI may be stored on any password-protected system. What action should you take first? Of course, some jobs are better suited to remote work than others. -Remove and take it with you whenever you leave your workstation. What is a best practice to protect data on your mobile computing device? How can you protect your information when using wireless technology? 1 Answer 0 votes answered by admic (1.0m points) selected by voice Best answer You must have your organization's permission to telework About the Telework Exchange, LLC The Telework Exchange is an online community focused on demonstrating the tangible value of telework and serving the emerging educational and communication. Employees who are teleworking should assess the portability of their work and the level of technology available at the remote site as they prepare to telework. Sensitive information may be stored on any password-protected system. For some, operating from a co-working spacea shared office that provides telecommuters and freelancers with internet access, meeting rooms and other amenitiescan help address social isolation. - CUI is an umbrella term that encompasses many different markings to identify information that is not classified but which should be protected. -Its classification level may rise when aggregated. Which of following is true of protecting classified data? (a) (1) Determine the proper balance in the Allowance to Reduce Inventory to Market at May 31, 2012. -When using a public device with a card reader, only use your DoD CAC to access unclassified information, Thumb drives, memory sticks, and flash drives are examples of. **Insider ThreatHow many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? What action should you take? Media containing Privacy Act information, PII, and PHI is not required to be labeled. Telework Eligible: No For More Info: NMassinguenj 840958473 massinguenj@state.gov Overview Hiring Path: Open to the public Who May Apply/Clarification From the Agency: All . What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web? Now, to learn more about telecommuting and its implications for the future of work, psychologists are studying remote works benefits, drawbacks and best practices. No. 1, 2019). Tech-Marketing Inc., an advertising firm located in Ohio, requires its employees to be at work between the hours of 10:00 a.m. to 3:00 p.m. How should you securely transport company information on a removable media? What is considered a mobile computing device and therefore shouldn't be plugged in to your Government computer? *SOCIAL ENGINEERING*What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? In another example of research-informed telecommuting, Kaila Jacoby, a consultant with a masters degree in I/O psychology, leads a work-from-home task force at DCI Consulting, a human resources risk-management consulting firm in Washington, D.C. Exceptionally grave damage. C. Telecommuting supports the strategy of corporate social responsibility by reducingthe employee's need to commute by vehicles. A coworker has asked if you want to download a programmers game to play at work. Disabling cookies. 1, 2010). Ive tried all the answers and it still tells me off. Duties. -Ask them to verify their name and office number. -Ask them to verify their name and office number Since the URL does not start with https, do not provide you credit card information. **Classified DataWhen classified data is not in use, how can you protect it? Verified answer question Which of the following is NOT a correct way to protect CUI? Sending regular mail to: Office of Personnel Management Open Season Processing Center P.O. What should be done to sensitive data on laptops and other mobile computing devices? . And because teleworkers cant make social connections during watercooler chats, Jacoby also suggests alternative ways to support staff relationship-building, including online message boards and small stipends for virtual lunch or coffee dates. You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). One can be at the same time appreciative of the need to include what to do under a threat of violence in employee training and viscerally opposed to the kind of active shooter drills that are currently en vogue. The parameters of this agreement are most often laid out by the agency policy and/or collective bargaining agreement but should include the following key elements: The manager and teleworker should work together to periodically evaluate the arrangement, make changes to the agreement as necessary, and re-sign the document. This article will provide you with all the questions and answers for Cyber Awareness Challenge. *CLASSIFIED DATA*What is a good practice to protect classified information? Answer The answer will depend largely on the requirements of your individual agency, the agency telework policy, and your manager. Before allowing employees to work remotely, organizations should reevaluate policies around performance evaluation, promotion and salary increases to ensure they dont favor on-site workers, she says. -Monitor credit card statements for unauthorized purchases. *MALICIOUS CODE*Which of the following is NOT a way malicious code spreads? The information that I provide while filling out this online employment application form and completing the application process, including possibly sensitive data, will be transferred online, stored, and processed on a server in the United States of America. Thruline Entertainment, East High School, Cheyenne, Wyoming Yearbook, Cote D'or Jewelry 14k Cross Necklace, The Finance Insider Direct Debit, Articles W
What should you do? 16, No. You can email your employees information to yourself so you can work on it this weekend and go home now. Which of the following refers to a list of the tasks, duties, and responsibilities that a job entails? Use online sites to confirm or expose potential hoaxes. A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. 1 Answer. Depending on the sensitivity of the information being handled, the home office may need to include security measures such as locked file cabinets, similar to what may be used at the official worksite. The flexibility, balanced work-home life and other benefits of telecommuting ultimately work to improve employee morale. But the impact of such arrangements on productivity, creativity and morale has been . Using OPM's Open Season Online system. c. Interpret the results in (a) and (b). What should you do if a reporter asks you about potentially classified information on the web? Compute the balances in both accounts after 101010 and 303030 years. **TravelWhat is a best practice while traveling with mobile computing devices? -Use TinyURL's preview feature to investigate where the link leads. A coworker has left an unknown CD on your desk. What should you do? softw are Question Not yet answered Marked out of 1.00 Flag question Question text Cell phones, BlackBerrys, iPhones, e-mail, and online conferencing over the Internet have . How are Trojan horses, worms, and malicious scripts spread? The following pairs of investment plan are identical except for a small difference in interest rates. You can find your Telework Coordinator, by searching OPM's Telework Contact Tool. Reducing the physical strain on employees performing the job. Use the classified network for all work, including unclassified work. Which method would be the BEST way to . d. All of the above are steps in the measurement process of external . What is NOT Personally Identifiable Information (PII)? B. PAQ reports provide concrete recommendations useful for writing job descriptions or redesigning jobs. What can you do to protect yourself against phishing? Which of the following is NOT an appropriate way to protect against inadvertent spillage? Never allow sensitive data on non-Government-issued mobile devices. Which of the following should you NOT do if you find classified information on the internet? Which of the following is a practice that helps to protect you from identity theft? *USE OF GFE*What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? As our readers might expect, new guidance from the Department of Labor and recent . 7 How the project work will be carried out, monitored, and controlled? Which of the following is a best practice for handling cookies? Which of the following best describes wireless technology? The email provides a website and a toll-free number where you can make payment. -TRUE The use of webmail is -is only allowed if the organization permits it Using webmail may bypass built in security features. Companies should never just implement telecommuting without changing anything else, says I/O psychologist Kristen Shockley, PhD, an associate professor at the University of Georgia. Which of the following HR activities is similar to analyzing a job that does not yet exist? Simplify the expressions with all exponents positive. Team members usually share work assignments. A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. Of the following, which is NOT a method to protect sensitive information? **Insider ThreatWhat type of activity or behavior should be reported as a potential insider threat? Which of the following is a best practice for handling cookies? -Make note of any identifying information and the website URL and report it to your security office. Remove your security badge after leaving your controlled area or office building. What should you do to protect classified data? Which of the following is NOT Government computer misuse? TPWD MISSION To manage and conserve the natural and cultural resources of Texas and to provide hunting, fishing and outdoor recreation opportunities for the use and enjoyment of present and future . Those workers tend to be older, more educated, full time and nonunion. *SOCIAL ENGINEERING*How can you protect yourself from internet hoaxes? Immediately notify your security point of contact. It is a worldwide federation of national standards bodies from 161 countries The OLPC XO-4 runs a Windows-based operating system FALSE A successful defense against a product liability case is typically expensive in terms of legal fees TRUE Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? Your comments are due on Monday. **Social EngineeringWhich of the following is a way to protect against social engineering? On the one hand, family and social obligations can easily bleed over into work hours. Use TinyURLs preview feature to investigate where the link leads. 2, 2014), employee engagement (Masuda, A.D., et al., Career Development International, Vol. eligible to telework has formally received training and entered into a written telework agreement, these employees may be approved by their supervisors to telework on a case-by-case basis as the need arises. How many potential insiders threat . People choose to work remotely to avoid daily commutes, reduce workplace distractions and fulfill family care responsibilities (Owl Labs State of Remote Work, 2017). Which of the following should be reported as a potential security incident (in accordance with your Agencys insider threat policy)? *MOBILE DEVICES*Which of the following is an example of removable media? Get IT support Teleworkers are dependent on fast, reliable, consistent connections. Which of the following does NOT constitute spillage? We are a customer driven technology division that provides innovative solutions that connects people and simplifies work. What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? Who needs to be notified that I will be teleworking? Despite the largely positive findings on the benefits of telecommuting, just 7% of American companies offer the option to most or all of their employees, according to recent BLS data. Quickly and professionally. You are working at your unclassified system and receive an email from a coworker containing a classified attachment. What should you do? Which of the following is NOT a DoD special requirement for tokens? New interest in learning another language? For more information, please consult your agency telework policy and/or Telework Coordinator. What is a possible indication of a malicious code attack in progress? c. Post the transaction to the T-account in the general ledger. Telecommuting supports the strategy of corporate social responsibility by reducing the employees need to commute by vehicles. 6, 2017). What should be your response? The Telework Enhancement Act defines telework or teleworking as a work flexibility arrangement under which an employee performs the duties and responsibilities of such employee's position, and other authorized activities, from an approved worksite other than the location from which the employee would otherwise work. Software that install itself without the user's knowledge. You should only accept cookies from reputable, trusted websites. Ask for information about the website, including the URL. (Correct) -It does not affect the safety of Government missions. -Use the government email system so you can encrypt the information and open the email on your government issued laptop. What action should you take first? Upon connecting your Government- issued laptop to a public wireless connection, what should you immediately do? C. Y is indirectly proportional to X then, Y = k X, where k is a constant. How many potential insider threat indicators is Bob displaying? National Archives & Records Administration, Sufficient portable work for the amount of telework proposed, Comfort with the technologies, if any, that will be needed to telework, Good communication with your manager, co-workers, customers that will enable a relatively seamless transition from onsite to offsite, Telework office space that is conducive to getting the work done, Dependent care (i.e., child care, elder care, or care of any other dependent adults) arrangements in place, Ability to be flexible about the telework arrangement to respond to the needs of the manager, the workgroup, and the work, Ability to work with minimal direct supervision, Location of the telework office (e.g., home or another alternative workplace), Equipment inventory (e.g., what the employee is supplying, what the agency is providing, and who is responsible to maintain it), A general overview of the type of work that will be performed while teleworking, Telework contact information (e.g., what phone number to use on the telework day). Of the following, which is NOT a characteristic of a phishing attempt? Greater physical distances can present logistical concerns when tasks require real-time communicationfor instance, during a military operation. How does verbalizing an attitude make it more likely that the attitude will guide your behavior? An employee can write reports or articles from a home office, but interpersonally sensitive tasks that may involve nonverbal communicationconducting a quarterly performance review with a subordinate, for exampletend to go more smoothly when handled face to face, says Golden. Researchers already know a lot about how to coordinate behavior and motivate people working in face-to-face teams, says Kozlowski. List (not a written letter of reference) of a minimum of three (3) professional references with complete name, title, organization where he/she works, description of relationship, and with . Spear Phishing attacks commonly attempt to impersonate email from trusted entities. What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? Under DLA policy, a first-line supervisor may be delegated authority to: Approved telework requests. What is an indication that malicious code is running on your system? Which of the following is NOT a correct way to protect CUI? The process of getting detailed information about jobs is known as _____. -Request the user's full name and phone number. Verified answer. -Validate all friend requests through another source before confirming them. 8 The review of the successes and the mistakes is normally held during _____ phase. Use your own facility access badge or key code. Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. What information most likely presents a security risk on your personal social networking profile? -After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. What should you do? If you are using assistive technology to view web content, please ensure your settings allow for the page content to update after initial load (this is sometimes called "forms mode"). A. Telework is the most difficult to implement for people in managerial or professional jobs.B. *PHYSICAL SECURITY*Within a secure area, you see an individual who you do not know and is not wearing a visible badge. **Insider ThreatWhich of the following should be reported as a potential security incident? TMOs will often work with a Telework Coordinator on the day-to-day operational aspects of telework. PII, PHI, and financial information is classified as what type of information? *HOME COMPUTER SECURITY*Which of the following is a best practice for securing your home computer? The Corporate Transparency Act (CTA) was enacted to prevent money laundering and promote a "know your customer" policy by imposing new disclosure requirements on "reporting companies." 6, 2007). But researchers also caution that teleworking is rarely an all-or-nothing arrangement. Health-care company Aetna, for example, has a decade-old remote work program that screens, trains and supports teleworkersa group that now makes up around half of the companys workforce. And such remote work can benefit both employers and employees, experts say. Which of the following is true about knowledge, skills, abilities, and other characteristics (KSAOs) that are required for a job? Report the crime to local law enforcement. What does Personally Identifiable Information (PII) include? When would be a good time to post your vacation location and dates on your social networking website? Traumatic Brain Injury (TBI) Awareness for Deploying Leaders and Commanders CBT Questions and Answers. Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? You are reviewing your employees annual self evaluation. Once permitted to return to the office building, you will be expected to do so within 30 calendar days of receiving notification. question. They play an important role in interviews and selection decisions. D. Y is indirectly proportional to X then, Y = k X, where k is a variable. Which method would be the BEST way to send this information? A coworker has asked if you want to download a programmers game to play at work. Which of the following statements is NOT true about protecting your virtual identity? b. You believe that you are a victim of identity theft. Which of the following best describes job sharing? What type of security is "part of your responsibility" and "placed above all else?". . Decline So That You Maintain Physical Control of Your Government-Issued Laptop. How many potential insiders threat indicators does this employee display? 6, 2019). A related line of research is also exploring how to maximize the effectiveness of geographically distributed teams that rely primarily on virtual means of communication. Get a Consultant. Abrams, Z. In June 2014, President Obama issued a Presidential Memorandum entitled, Enhancing Workplace Flexibilities and Work-Life Programs, as a way to help attract, empower and retain a talented and productive workforce in the 21st century. For more information about agency-based telework training and/or information technology training, please consult your agency Telework Coordinator or TMO. *SOCIAL NETWORKING*Which of the following is a security best practice when using social networking sites? [ 8.3.3 - Identify threats and attacks to an acquisition program life cycle . The research has generally shown that for most outcomes, remote work leads to small but tangible benefits, says I/O psychologist Bradford Bell, PhD, professor and director of the Center for Advanced Human Resource Studies (CAHRS) at Cornell University. Which of the following is a good practice to avoid email viruses? Decline to lend the man your phone. In another line of research, psychologists are exploring how to maximize the efficiency and productivity of teams that are geographically dispersed. What should you do? HIRING PREFERENCE SELECTION PROCESS: Applicants in the following hiring preference categories are extended a hiring preference in the . TMOs will often work with a Telework Coordinator on the day-to-day operational aspects of telework. 2003-2023 Chegg Inc. All rights reserved. **Classified DataWhat is a good practice to protect classified information? CUI may be stored on any password-protected system. What action should you take first? Of course, some jobs are better suited to remote work than others. -Remove and take it with you whenever you leave your workstation. What is a best practice to protect data on your mobile computing device? How can you protect your information when using wireless technology? 1 Answer 0 votes answered by admic (1.0m points) selected by voice Best answer You must have your organization's permission to telework About the Telework Exchange, LLC The Telework Exchange is an online community focused on demonstrating the tangible value of telework and serving the emerging educational and communication. Employees who are teleworking should assess the portability of their work and the level of technology available at the remote site as they prepare to telework. Sensitive information may be stored on any password-protected system. For some, operating from a co-working spacea shared office that provides telecommuters and freelancers with internet access, meeting rooms and other amenitiescan help address social isolation. - CUI is an umbrella term that encompasses many different markings to identify information that is not classified but which should be protected. -Its classification level may rise when aggregated. Which of following is true of protecting classified data? (a) (1) Determine the proper balance in the Allowance to Reduce Inventory to Market at May 31, 2012. -When using a public device with a card reader, only use your DoD CAC to access unclassified information, Thumb drives, memory sticks, and flash drives are examples of. **Insider ThreatHow many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? What action should you take? Media containing Privacy Act information, PII, and PHI is not required to be labeled. Telework Eligible: No For More Info: NMassinguenj 840958473 massinguenj@state.gov Overview Hiring Path: Open to the public Who May Apply/Clarification From the Agency: All . What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web? Now, to learn more about telecommuting and its implications for the future of work, psychologists are studying remote works benefits, drawbacks and best practices. No. 1, 2019). Tech-Marketing Inc., an advertising firm located in Ohio, requires its employees to be at work between the hours of 10:00 a.m. to 3:00 p.m. How should you securely transport company information on a removable media? What is considered a mobile computing device and therefore shouldn't be plugged in to your Government computer? *SOCIAL ENGINEERING*What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? In another example of research-informed telecommuting, Kaila Jacoby, a consultant with a masters degree in I/O psychology, leads a work-from-home task force at DCI Consulting, a human resources risk-management consulting firm in Washington, D.C. Exceptionally grave damage. C. Telecommuting supports the strategy of corporate social responsibility by reducingthe employee's need to commute by vehicles. A coworker has asked if you want to download a programmers game to play at work. Disabling cookies. 1, 2010). Ive tried all the answers and it still tells me off. Duties. -Ask them to verify their name and office number. -Ask them to verify their name and office number Since the URL does not start with https, do not provide you credit card information. **Classified DataWhen classified data is not in use, how can you protect it? Verified answer question Which of the following is NOT a correct way to protect CUI? Sending regular mail to: Office of Personnel Management Open Season Processing Center P.O. What should be done to sensitive data on laptops and other mobile computing devices? . And because teleworkers cant make social connections during watercooler chats, Jacoby also suggests alternative ways to support staff relationship-building, including online message boards and small stipends for virtual lunch or coffee dates. You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). One can be at the same time appreciative of the need to include what to do under a threat of violence in employee training and viscerally opposed to the kind of active shooter drills that are currently en vogue. The parameters of this agreement are most often laid out by the agency policy and/or collective bargaining agreement but should include the following key elements: The manager and teleworker should work together to periodically evaluate the arrangement, make changes to the agreement as necessary, and re-sign the document. This article will provide you with all the questions and answers for Cyber Awareness Challenge. *CLASSIFIED DATA*What is a good practice to protect classified information? Answer The answer will depend largely on the requirements of your individual agency, the agency telework policy, and your manager. Before allowing employees to work remotely, organizations should reevaluate policies around performance evaluation, promotion and salary increases to ensure they dont favor on-site workers, she says. -Monitor credit card statements for unauthorized purchases. *MALICIOUS CODE*Which of the following is NOT a way malicious code spreads? The information that I provide while filling out this online employment application form and completing the application process, including possibly sensitive data, will be transferred online, stored, and processed on a server in the United States of America.

Thruline Entertainment, East High School, Cheyenne, Wyoming Yearbook, Cote D'or Jewelry 14k Cross Necklace, The Finance Insider Direct Debit, Articles W

which of the following is true about telework