Some employees work from home a few days a month, some a few days a week and some full timeand the extent of a workers telecommuting can dictate his or her experience. He lets the staff decide whether to issue refunds or replace merchandise in case of consumer grievances. Which of the following represents a good physical security practice? Which of the following is not a step in the process of measuring external transactions? How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Neither confirm or deny the information is classified. -Looking for "https" in the URL. New interest in learning a foreign language. When its done right, telework can improve employee productivity, creativity and morale, psychologists research finds. What is considered ethical use of the Government email system? Which of the following is a true statement? 7 How the project work will be carried out, monitored, and controlled? D. A manager of a revenue center is responsible for all of the following EXCEPT a. service quality and units sold. T/F. *SOCIAL ENGINEERING*What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? 1, 2019). Qualified Offerors must upload the following (4) documents in ERA (Do not upload more documents) or their offers will not be considered for this position: 1. What action should you take? What should you do? Which of the following is true about telework? Do not access links or hyperlinked media such as buttons and graphics in email messages. 1) Which of the following statements about the U.S. workforce is true? Bob, a coworker, has been going through a divorce, has financial difficulties and is displaying hostile behavior. Get a Consultant. You can find your Telework Coordinator, by searching OPM's Telework Contact Tool. Which is a risk associated with removable media? Does OPM provide employee and/or manager training that agencies . In these cases, leadership functions need to be shifted to the team itself, so members with specific expertise can drive problem-solving in various areas.. For the current COVID-19 Requirements please visit the following link. Identification, encryption, and digital signature. **Insider ThreatWhich of the following should be reported as a potential security incident? A man you do not know is trying to look at your Government-issued phone and has asked to use it. The potential for unauthorized viewing of work-related information displayed on your screen. Report the crime to local law enforcement. *SpillageWhat should you do when you are working on an unclassified system and receive an email with a classified attachment? CUI may be stored on any password-protected system. If you are interested in teleworking, or already telework but want to ensure you become a more effective teleworker, here are the key steps to success. Which of the following actions is appropriate after finding classified information on the Internet? 62, No. Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. You can email your employees information to yourself so you can work on it this weekend and go home now. Telework is here to stay, says industrial/organizational (I/O) psychologist Timothy Golden, PhD, professor and area coordinator of enterprise management and organization at, Rensselaer Polytechnic Institute in Troy, New York. The Telework Enhancement Act defines telework or teleworking as a work flexibility arrangement under which an employee performs the duties and responsibilities of such employee's position, and other authorized activities, from an approved worksite other than the location from which the employee would otherwise work. -If aggregated, the classification of the information may not be changed. A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. Decline so that you maintain physical contact of your Government-issued laptop. Which of the following HR activities is similar to analyzing a job that does not yet exist? A coworker has asked if you want to download a programmers game to play at work. Exceptionally grave damage. Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. Which is NOT a method of protecting classified data? reducing the information-processing requirements of a job. Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? Use the classified network for all work, including unclassified work. Verified answer. Since the URL does not start with https, do not provide your credit card information. *SENSITIVE COMPARTMENTED INFORMATION*When faxing Sensitive Compartmented Information (SCI), what actions should you take? Malicious code can do the following except? *MOBILE DEVICES*Which of the following is an example of removable media? A remote work arrangement is one in which an employee is not required to regularly and repeatedly report to an agency workplace and is instead scheduled to perform work within or outside the local commuting area of the agency worksite.The employee supplies their own workspace, which is . New interest in learning another language? Step 13: Participate in telework and lead by example Managers and supervisors must be committed to using telework to the fullest extent possible if Federal telework programs are to be successful. Now, to learn more about telecommuting and its implications for the future of work, psychologists are studying remote works benefits, drawbacks and best practices. The email states your account has been compromised and you are invited to click on the link in order to reset your password. You receive an unexpected email from a friend: I think youll like this: https://tinyurl.com/2fcbvy. What action should you take? Ive tried all the answers and it still tells me off, part 2. In which situation below are you permitted to use your PKI token? Many workers view telecommuting as a job perk, with more than half seeking the arrangement as a way to improve work-life balance. Discuss the difference. Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? Trust among team members starts lower in virtual teams than in face-to-face teams, but over time, it can build to the same levels, she says. What should you do if someone forgets their access badge (physical access)? With regard to COOP, note that Emergency Relocation Group (ERG) members must be prepared to telework at any time. What are some of the potential advantages and disadvantages? b. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. *Sensitive InformationWhat is the best example of Personally Identifiable Information (PII)? -Following instructions from verified personnel. They can be part of a distributed denial-of-service (DDoS) attack. In a shared office full of potential interruptions, that can be hard to do.. Which of the following is a practice that helps to protect you from identity theft? Of the following, which is NOT a security awareness tip? -It never requires classification markings. She comes across an advertisement in a newspaper seeking applications for the post of an HR manager. -Make note of any identifying information and the website URL and report it to your security office. In a 2015 research review, Golden and his colleagues found that, overall, telecommuting increased job satisfaction, performance and feelings of commitment to an organization among employees. A pop-up window that flashes and warns that your computer is infected with a virus. -After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. Interestingly, the growing popularity of remote work could end up dampening its benefits, suggests research by Gajendran. In another example of research-informed telecommuting, Kaila Jacoby, a consultant with a masters degree in I/O psychology, leads a work-from-home task force at DCI Consulting, a human resources risk-management consulting firm in Washington, D.C. Diffusion Let us complete them for you. Which of the following is NOT a security best practice when saving cookies to a hard drive? For analyzing technical skill levels, the best source for job information may be ____, who have vast experience rating a wide range of jobs. Your comments are due on Monday. * March 3, 2023 at 11:30 pm. (b) Explain the rationale for the use of the lower-of . results in abstract reports that are of limited use. Note that the American Rescue Plan Act of 2021 (ARP), enacted March 11, 2021, amended and extended the tax credits (and the availability of advance payments of the tax credits) for paid sick and family leave for wages paid with respect to the period beginning April 1, 2021, and ending on September 30, 2021. b. identifying those who might be wasting their talents and not taking school seriously. You DoD Common Access Card has a Public Key Infrastructure (PKI) token approved fro access to the Non-classified Internet Protocol Router Network (NIPRNet). (Ed.) To secure IoT devices: Examine the default security options available Enable any security features Set a robust password at the device's maximum length, if possible On a NIPRNet system while using it for a PKI-required task. What is the best choice to describe what has occurred? (23)2\left(\frac{2}{3}\right)^{-2} -Remove security badge as you enter a restaurant or retail establishment. Use a single, complex password for your system and application logons. Get IT support Teleworkers are dependent on fast, reliable, consistent connections. **Insider ThreatWhich of the following should be reported as a potential security incident (in accordance with you Agencys insider threat policy)? Telecommuting arrangements can vary greatly for different workers. Question : Which of the following is true about telework? -You must have your organization's permission to telework. Use TinyURLs preview feature to investigate where the link leads. To make jobs less repetitive and more interesting. Record the transaction using debits and credits. A coworker brings a personal electronic device into prohibited areas. Secure personal mobile devices to the same level as Government-issued systems. "Telework is a work arrangement that allows an employee to perform work during any part of regular, paid hours, at an approved alternative worksite (e.g., home or telework center). 8 The review of the successes and the mistakes is normally held during _____ phase. How many potential insider threat indicators does this employee display? Digital Nomads: The Final Frontier of Work Arrangements. Physical security of mobile phones carried overseas is not a major issue. 2003-2023 Chegg Inc. All rights reserved. *SENSITIVE COMPARTMENTED INFORMATION*When is it appropriate to have your security badge visible within a sensitive compartmented information facility (SCIF)? In terms of the Job Characteristics Model, feedback refers to the extent to which _____. 6, 2007). Ask the individual to see an identification badge. What should the participants in this conversation involving SCI do differently? Work with our consultant to learn what to alter. Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. Drawbacks included social and professional isolation, fewer opportunities for information sharing and a blurring of boundaries between work and personal life (Allen, T.D., et al., Psychological Science in the Public Interest, Vol. **Insider ThreatA colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. What information most likely presents a security risk on your personal social networking profile? As a security best practice, what should you do before exiting? -TRUE What action is recommended when somebody calls you to inquire about your work environment or specific account information? For the current COVID-19 Requirements please visit the following link. The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. The advertisement exclusively highlights requirements such as strong communication skills, excellent teamwork, and leadership skills. -Unclassified information cleared for public release. **Identity managementWhich is NOT a sufficient way to protect your identity? C. Y is indirectly proportional to X then, Y = k X, where k is a constant. 2, 2015). Ive tried all the answers and it still tells me off. In addition to formally exploring any cultural or ideological differences, collaborators should also consider how such teams are led. What is an indication that malicious code is running on your system? a. Analyze the impact of the transaction on the accounting equation. These questions are answered in which phase of the project management? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Which of the following is NOT Protected Health Information (PHI)? A good telework arrangement starts with a good self-assessment. The Federal Government is a leader in the use of innovative workplace arrangements like telework. You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. Which of the following is NOT a requirement for telework? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. 42, No. *SpillageWhich of the following may help prevent inadvertent spillage? D. How can you protect your information when using wireless technology? Step 1: Know your Telework Managing Officer and Telework Coordinator All agencies must designate a Telework Managing Officer (TMO), who is the agency's primary contact for policy and program questions. Your comments are due on Monday. (Correct). As long as the document is cleared for public release, you may release it outside of DoD. *SpillageWhat should you do if a reporter asks you about potentially classified information on the web? What describes how Sensitive Compartmented Information is marked? You must possess security clearance eligibility to telework. Which of the following is NOT a criterion used to grant an individual access to classified data? Which of the following definitions is true about disclosure of confidential information? What actions should you take prior to leaving the work environment and going to lunch? Employers can hire geographically distributed talent and reduce overhead expenses, while employees can gain flexibility, save time, and reduce transportation and some child-care costs. What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? 1, 2010). Advancing psychology to benefit society and improve lives, Center for Advanced Human Resource Studies, Workplace Redesign: Current Trends, Challenges, and Opportunities, Virtual Teams: Conceptualization, Integrative Review and Research Recommendations. If you are using assistive technology to view web content, please ensure your settings allow for the page content to update after initial load (this is sometimes called "forms mode"). You receive an email from a company you have an account with. **Mobile DevicesWhich is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Still, he says, companies that offer telework arrangements strategicallyby making it contingent upon hitting performance targets, for instancemay be able to avoid such pitfalls. But the impact of such arrangements on productivity, creativity and morale has been up for debate, primarily because working from home offers employees fewer opportunities to talk and network with their colleagues. Shockley, K. Society for Industrial and Organizational Psychology, 2014. Between 2005 and 2015, the number of U.S. employees who telecommuted increased by 115%. Who needs to be notified that I will be teleworking? Which of the following is an invalid guideline for securing telework computers and laptops , per the National Institute of Standards and Technology ( NIST ) Special Publication ( SP ) 800-114 ? How many potential insider threat indicators does this employee display? Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Jane JonesSocial security number: 123-45-6789, Select the information on the data sheet that is protected health information (PHI). a. 6 The scope of the work is defined in which phase of the project management? Teams with a strong group identityfor instance, those that have unified against a competing team or organizationtend to have more perceived proximity, Wilson says. Use TinyURLs preview feature to investigate where the link leads. A coworker has left an unknown CD on your desk. You are reviewing your employees annual self evaluation. New interest in learning a foregin language. Mak, S., & Kozlowski, S.W.J., In Landers, R.N. As our readers might expect, new guidance from the Department of Labor and recent . Telework Eligible: No For More Info: NMassinguenj 840958473 massinguenj@state.gov Overview Hiring Path: Open to the public Who May Apply/Clarification From the Agency: All . What security device is used in email to verify the identity of sender? Let us have a look at your work and suggest how to improve it! How can you protect your information when using wireless technology? In June 2014, President Obama issued a Presidential Memorandum entitled, Enhancing Workplace Flexibilities and Work-Life Programs, as a way to help attract, empower and retain a talented and productive workforce in the 21st century. These habits include: For more information, visit theSelf-Assessment & Safety Checklist pages. The CAC/PIV is a controlled item and contains certificates for: Classified Information can only be accessed by individuals with, -Assigned a classification level by a supervisor. Jacoby recommends that firms get company-wide buy-in for telework and include remote workers in all team- and company-wide events, via video conferencing when necessary. -Look for a digital signature on the email. Those workers tend to be older, more educated, full time and nonunion. C. Telecommuting supports the strategy of corporate social responsibility by reducingthe employee's need to commute by vehicles. It can be most beneficial to simplify jobs where _____. Which of the following is true about telework? What should you do? But researchers also caution that teleworking is rarely an all-or-nothing arrangement. Which of the following is a proper way to secure your CAC/PIV? *Sensitive InformationUnder what circumstances could classified information be considered a threat to national security? -Directing you to a web site that is real. Box 5000 Lawrence, KS 66046-0500 *UNCONTROLLED CLASSIFIED INFORMATION*Which of the following is NOT an example of CUI? Telecommuting is a management tool just like any other, Gajendran says. Its classification level may rise when aggregated. An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? Of the following, which is NOT a method to protect sensitive information? Which of the following is a good practice to avoid email viruses? Contact the IRS using their publicly available, official contact information. Which of the following refers to a list of the tasks, duties, and responsibilities that a job entails? Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. What is a best practice to protect data on your mobile computing device? *INSIDER THREAT*Which of the following is NOT considered a potential insider threat indicator? The SDC provides the RSO with timely analysis of notable events and receives daily reports, which she/he is responsible for analyzing, translating, and inputting daily data into the Security Incident Management and Analysis System (SIMAS). *PHYSICAL SECURITY*Within a secure area, you see an individual who you do not know and is not wearing a visible badge. What type of data must be handled and stored properly based on classification markings and handling caveats?