which of the following is true about telework
What describes how Sensitive Compartmented Information is marked? Which of the following is NOT an appropriate way to protect against inadvertent spillage? The Corporate Transparency Act (CTA) was enacted to prevent money laundering and promote a "know your customer" policy by imposing new disclosure requirements on "reporting companies." -Unclassified information cleared for public release. Decline So That You Maintain Physical Control of Your Government-Issued Laptop. Which of these is true of unclassified data?-Its classification level may rise when aggregated. What should you do to protect classified data? **Classified DataWhich of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? Employers may see these outcomes as positive, translating into higher productivity and better workplace citizenship. A man you do not know is trying to look at your Government-issued phone and has asked to use it. Interestingly, the growing popularity of remote work could end up dampening its benefits, suggests research by Gajendran. *SOCIAL ENGINEERING*How can you protect yourself from social engineering? Who can be permitted access to classified data? -Following instructions from verified personnel. Which method would be the BEST way to send this information? Under DLA policy, a first-line supervisor may be delegated authority to: Approved telework requests. Depending on the sensitivity of the information being handled, the home office may need to include security measures such as locked file cabinets, similar to what may be used at the official worksite. Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? In todays global economy, virtual teams can be distributed across different offices or departments in a single organization or they can span time zones, industries and national borders. **Identity ManagementWhich of the following is the nest description of two-factor authentication? A manager of a revenue center is responsible for all of the following EXCEPT a. service quality and units sold. Using webmail may bypass built in security features. **Insider ThreatWhich of the following is NOT considered a potential insider threat indicator? *SOCIAL NETWORKING*When is the safest time to post details of your vacation activities on your social networking profile? *Sensitive InformationWhich of the following is an example of Protected Health Information (PHI)? Sensitive information may be stored on any password-protected system. As part of the telework arrangement, be clear about when teleworkers are expected to be completing tasks and when they should be responsive to incoming calls or emails. Which of the following is true about knowledge, skills, abilities, and other characteristics (KSAOs) that are required for a job? Ive tried all the answers and it still tells me off, part 2. Which of the following is NOT a typical result from running malicious code? The telework agreement should specify what equipment and/or expenses will be covered by the agency, employee, or shared. It all depends on the context.. question. 3, 2017). In the Job Characteristics Model, task identity is defined as the _____. What information should you avoid posting on social networking sites? It can be most beneficial to simplify jobs where _____. In the case of emergency telework, what should I have available at all times at my home office that would enable me to be functional without coming onsite to retrieve materials. Study the diagram of the hemispheres on page 20 . In a study of 273 teleworkers from sales, marketing, accounting, engineering and other departments at one organization, Gajendran and Golden found that employees whose jobs were highly complex but did not require significant collaboration or social support performed better when telecommuting than when working in the companys office (Journal of Business and Psychology, Vol. In these cases, leadership functions need to be shifted to the team itself, so members with specific expertise can drive problem-solving in various areas.. Which of the following is true about telework? **Social EngineeringWhich of the following is a way to protect against social engineering? Phishing can be an email with a hyperlink as bait. Which of the following is true of protecting classified data? What information posted publicly on your personal social networking profile represents a security risk? 21, No. Which of the following is NOT considered a potential insider threat indicator? (23)2\left(\frac{2}{3}\right)^{-2} a) A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. DoD employees are prohibited from using a DoD CAC in card-reader-enabled public devices. Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. It is getting late on Friday. Which of the following demonstrates proper protection of mobile devices? *HOME COMPUTER SECURITY*Which of the following is a best practice for securing your home computer? Telework is here to stay, says industrial/organizational (I/O) psychologist Timothy Golden, PhD, professor and area coordinator of enterprise management and organization at, Rensselaer Polytechnic Institute in Troy, New York. Telework helps make great places In 1964, science fiction writer Arthur C. Clarke predicted that doctors on one continent would one day operate on a patient on another continent, but missed the. 16, No. In a shared office full of potential interruptions, that can be hard to do.. A) They are only provided for employees who hold key strategic positions in a company B) They are the casiest to set up for manufacturing workers. Which of the following is NOT a typical result from running malicious code? The information that I provide while filling out this online employment application form and completing the application process, including possibly sensitive data, will be transferred online, stored, and processed on a server in the United States of America. In setting up your personal social networking service account, what email address should you use? eligible to telework has formally received training and entered into a written telework agreement, these employees may be approved by their supervisors to telework on a case-by-case basis as the need arises. *INSIDER THREAT*What threat do insiders with authorized access to information or information systems pose? (Correct). Of the following, which is NOT an intelligence community mandate for passwords? In addition, many agencies offer their own training as part of their telework policy and procedures. What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure? The SDC provides the RSO with timely analysis of notable events and receives daily reports, which she/he is responsible for analyzing, translating, and inputting daily data into the Security Incident Management and Analysis System (SIMAS). The following pairs of investment plan are identical except for a small difference in interest rates. Its classification level may rise when aggregated. Gajendran and his colleagues found that teleworkers often go above and beyondfor instance, by responding to emails outside of work hoursto demonstrate their organizational commitment (Personnel Psychology, Vol. What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited? results in abstract reports that are of limited use. At 0.05 level of significance, test whether there is any difference between the means of two populations. As a security best practice, what should you do before exiting? Answer The answer will depend largely on the requirements of your individual agency, the agency telework policy, and your manager. - CUI is an umbrella term that encompasses many different markings to identify information that is not classified but which should be protected. Employers can hire geographically distributed talent and reduce overhead expenses, while employees can gain flexibility, save time, and reduce transportation and some child-care costs. (Correct) -It does not affect the safety of Government missions. -Classified material must be appropriately marked. There are many travel tips for mobile computing. Teams with a strong group identityfor instance, those that have unified against a competing team or organizationtend to have more perceived proximity, Wilson says. -Validate all friend requests through another source before confirming them. Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? Within a secure area, you see an individual you do not know. You are working at your unclassified system and receive an email from a coworker containing a classified attachment. Some early adoptersincluding Best Buy, IBM and Yahooare even reversing policies that once allowed employees to telecommute, citing leadership changes and a growing need for creative collaboration. How many potential insiders threat indicators does this employee display? *Sensitive Compartmented InformationWhen should documents be marked within a Sensitive Compartmented Information Facility (SCIF), ~All documents should be appropriately marked, regardless of format, sensitivity, or classification.Unclassified documents do not need to be marked as a SCIF.Only paper documents that are in open storage need to be marked.Only documents that are classified Secret, Top Secret, or SCI require marking. 34, No. Of course, some jobs are better suited to remote work than others. We are a customer driven technology division that provides innovative solutions that connects people and simplifies work. **Identity managementWhat is the best way to protect your Common Access Card (CAC)? Which of the following is NOT a typical result from running malicious code? Physical security of mobile phones carried overseas is not a major issue. -Look for a digital signature on the email. What information most likely presents a security risk on your personal social networking profile? 42, No. With regard to COOP, note that Emergency Relocation Group (ERG) members must be prepared to telework at any time. The email states your account has been compromised and you are invited to click on the link in order to reset your password. You must have your organization's permission to telework. But when most employees at an organization are allowed to telecommute, working remotely more often does not improve work performance, suggesting that enthusiasm about the arrangement may wane in such cases (Personnel Psychology, Vol. How can you guard yourself against Identity theft? Since the URL does not start with https, do not provide your credit card information. B. Which of the following is NOT a requirement for telework? Work with our consultant to learn what to alter. Jacoby recommends that firms get company-wide buy-in for telework and include remote workers in all team- and company-wide events, via video conferencing when necessary. You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). Computer programmers, travel agents and tech support personnel only need a telephone and a computer with internet access to do . Which method would be the BEST way to . Understanding and using the available privacy settings. The flexibility, balanced work-home life and other benefits of telecommuting ultimately work to improve employee morale. It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. What actions should you take prior to leaving the work environment and going to lunch? Teleworkers also appear to work more. Of the following, which is NOT a problem or concern of an Internet hoax? Which of the following is an example of a strong password? Never allow sensitive data on non-Government-issued mobile devices. Carl Borden, the manager of an electronics store in California, gives his staff the authority to resolve customer complaints. The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. A coworker brings a personal electronic device into prohibited areas.