Home Flashcards DOD Cyber Awareness Challenge 2019. "Telework is a work arrangement that allows an employee to perform work during any part of regular, paid hours, at an approved alternative worksite (e.g., home or telework center). The final stage in work flow analysis is to identify the _____. Accounting is "an information system that identifies, records, and communicates the economic events of an organization to interested users." Instructions Categorize the accounting tasks performed by Genesis as relating to either the identification (I), recording (R), or communication (C) aspects of accounting. Which of the following is NOT a criterion used to grant an individual access to classified data? -It is inherently not a secure technology. When leaving your work area, what is the first thing you should do? Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. Decline So That You Maintain Physical Control of Your Government-Issued Laptop. Answers: Apples, pears, oranges, bananas. Your comments are due on Monday. What describes how Sensitive Compartmented Information is marked? Approved Security Classification Guide (SCG). -Store it in a shielded sleeve to avoid chip cloning. What should you do? -Validate all friend requests through another source before confirming them. You are logged on to your unclassified computer and just received an encrypted email from a co-worker. Which of the following is NOT one? *Sensitive Compartmented InformationWhen should documents be marked within a Sensitive Compartmented Information Facility (SCIF), ~All documents should be appropriately marked, regardless of format, sensitivity, or classification.Unclassified documents do not need to be marked as a SCIF.Only paper documents that are in open storage need to be marked.Only documents that are classified Secret, Top Secret, or SCI require marking. What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? A coworker removes sensitive information without authorization. When teleworking, you should always use authorized and software. What should be done to sensitive data on laptops and other mobile computing devices? To answer a question like that, you'd need more context (i.e. As detailed in the Act, all agencies must have a telework policy. Which of the following is NOT an example of CUI? The study of the interface between individuals physiology and the characteristics of the physical work environment. If you are an annuitant, please contact the Retirement Office during Open Season via one of the following methods: Using Open Season Express by calling 1-800-332-9798. What is the best choice to describe what has occurred? You must have your organization's permission to telework. To make jobs less repetitive and more interesting. Which of the following is NOT Government computer misuse? Those include the effects of increasing the extent of telecommuting, best practices for managers and the relative effectiveness of various communication methods, particularly video, says Golden. 62, No. Label all files, removable media, and subject headers with appropriate classification markings. But the impact of such arrangements on productivity, creativity and morale has been . Which of the following best describes wireless technology? What should be your response? How many potential insiders threat indicators does this employee display? Our Enterprise Technology Solutions (ETS) IT shop is not just another team in a government agency. 17, No. A coworker has asked if you want to download a programmers game to play at work. Since the URL does not start with https, do not provide you credit card information. **Physical SecurityAt which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? Sensitive information may be stored on any password-protected system. Which of the following is a best practice for handling cookies? How many potential insiders threat indicators does this employee display? By "interactive," does this mean that training must be "instructor-led" or face-to-face rather than via computer? Some early adoptersincluding Best Buy, IBM and Yahooare even reversing policies that once allowed employees to telecommute, citing leadership changes and a growing need for creative collaboration. Trust among team members starts lower in virtual teams than in face-to-face teams, but over time, it can build to the same levels, she says. As a security best practice, what should you do before exiting? What should you do if someone asks to use your government issued mobile device (phone/laptop..etc)? Between 2005 and 2015, the number of U.S. employees who telecommuted increased by 115%. If you participate in or condone it at any time. Get IT support Teleworkers are dependent on fast, reliable, consistent connections. Which of the following is NOT a typical means for spreading malicious code? You are reviewing your employees annual self evaluation. Moving forward, he hopes to see researchers studying virtual teams do a better job of building on those existing insights, such as by investigating how to coordinate knowledge sharing in virtual teams. Which of the following is NOT a best practice to protect data on your mobile computing device? The email has an attachment whose name contains the word "secret". You know this project is classified. Which of the following is NOT a typical result from running malicious code? Often, managers use busyness, working late or other proxies to infer that an employee is effective, says Jeanne Wilson, PhD, a professor of organizational behavior at the College of William & Mary in Williamsburg, Virginia. Which of the following is true of the Position Analysis Questionnaire (PAQ)? Which method would be the BEST way to send this information? (32)2. Which of the following is a practice that helps to protect you from identity theft? Immediately notify your security point of contact. Which of the following job design techniques does Carl implement in his store? For more information about agency-based telework training and/or information technology training, please consult your agency Telework Coordinator or TMO. 38, No. Mak, S., & Kozlowski, S.W.J., In Landers, R.N. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. What is NOT Personally Identifiable Information (PII)? While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. In many cases this is true. -Ask them to verify their name and office number. Which of the following is an invalid guideline for securing telework computers and laptops , per the National Institute of Standards and Technology ( NIST ) Special Publication ( SP ) 800-114 ? 38, No. Which of the following is true? -Delete email from senders you do not know. It uses a common language that generalizes across jobs to describe the abilities, work styles, work activities, and work context required for various occupations. Someone calls from an unknown number and says they are from IT and need some information about your computer. No. **Website UseWhile you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. What should be your response? *Sensitive InformationWhat type of unclassified material should always be marked with a special handling caveat? Never allow sensitive data on non-Government-issued mobile devices. Your health insurance explanation of benefits (EOB). A remote work arrangement is one in which an employee is not required to regularly and repeatedly report to an agency workplace and is instead scheduled to perform work within or outside the local commuting area of the agency worksite.The employee supplies their own workspace, which is . Telework can give employees more control over their schedules and flexibility in meeting personal and professional responsibilities. Meanwhile, Wilson is expanding her focus to explore the roles of extroversion and attractivenessboth of which are associated with leadershipin virtual team dynamics. A pop-up window that flashes and warns that your computer is infected with a virus. you are indicating that all information is true and correct. Its classification level may rise when aggregated. More than 26 million Americansabout 16% of the total workforcenow work remotely at least part of the time, according to the U.S. Bureau of Labor Statistics (BLS). Sensitive information may be stored on any password-protected system. Which of these $100 face value one-year bonds will have the highest yield to maturity and why? Follow instructions given only by verified personnel. What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited? 2, 2015). identify the correct and incorrect statements about executive orders. * CLASSIFIED DATA*Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? They are the most difficult to implement for people in managerial or professional jobs. which of the following is true of telework An insider threat uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions resulting in loss or degradation of resources or capabilities. Teams with a strong group identityfor instance, those that have unified against a competing team or organizationtend to have more perceived proximity, Wilson says. 0 votes . **Mobile DevicesWhich of the following helps protect data on your personal mobile devices? *SpillageAfter reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. reducing the information-processing requirements of a job. -Use TinyURL's preview feature to investigate where the link leads. Ive tried all the answers and it still tells me off, part 2. asked May 31, 2022 in Other by Kamal (64.9k points) Which of the following is true about telework? What should the owner of this printed SCI do differently? What should you do? e. finding children who were struggling academically. Of the following, which is NOT a method to protect sensitive information? Which type of information includes personal, payroll, medical, and operational information? You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). Use online sites to confirm or expose potential hoaxes. **Classified DataWhich of the following is true of protecting classified data? a. Depending on the sensitivity of the information being handled, the home office may need to include security measures such as locked file cabinets, similar to what may be used at the official worksite. 2, 2015). -Unclassified information cleared for public release. Health-care company Aetna, for example, has a decade-old remote work program that screens, trains and supports teleworkersa group that now makes up around half of the companys workforce. Have your permissions from your organization, follow your organization guideline, use authorized equipment and software, employ cyber security best practice, perform telework in dedicated when home.
Tesla Training Center, Terrence Lewis Scouting Report, Can You Bring Hard Liquor To A Byob Restaurant, Articles W