FROM THE CREATORS OF. Mark SCI documents appropriately and use an approved SCI fax machine. And you can ask questions on the content site through the word "Ask a question" at the . What should be your response? 2, 2015). which of the following is true of telework An insider threat uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions resulting in loss or degradation of resources or capabilities. One can be at the same time appreciative of the need to include what to do under a threat of violence in employee training and viscerally opposed to the kind of active shooter drills that are currently en vogue. Get IT support Teleworkers are dependent on fast, reliable, consistent connections. In the case of emergency telework, what should I have available at all times at my home office that would enable me to be functional without coming onsite to retrieve materials. Which of the following is NOT true of traveling overseas with a mobile phone? Using webmail may bypass built in security features. *PHYSICAL SECURITY*At which Cyberspace Protection Condition (CPCON) is the priority focus on critical and essential functions? As long as the document is cleared for public release, you may share it outside of DoD. Which of the following is an appropriate course of action while formulating job descriptions? More than 26 million Americansabout 16% of the total workforcenow work remotely at least part of the time, according to the U.S. Bureau of Labor Statistics (BLS). Which of the following refers to a list of the tasks, duties, and responsibilities that a job entails? The Act requires employees to successfully complete telework training before they can telework. Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? What is a best practice to protect data on your mobile computing device? Which of the following is NOT a correct way to protect CUI? It is getting late on Friday. Some early adoptersincluding Best Buy, IBM and Yahooare even reversing policies that once allowed employees to telecommute, citing leadership changes and a growing need for creative collaboration. -Senior government personnel, military or civilian. . **Removable Media in a SCIFWhat must users ensure when using removable media such as compact disk (CD)? Which of these is true of unclassified data? Which of the following is true about telework? What should you do if someone asks to use your government issued mobile device (phone/laptop..etc)? New interest in learning a foreign language. Which of the following should you NOT do if you find classified information on the internet? 22, No. You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). Which of the following is an example ofmalicious code? Which of the following is NOT true concerning a computer labeled SECRET? Examples are: Patient names, Social Security numbers, Drivers license numbers, insurance details, and birth dates. Which of the following actions is appropriate after finding classified information on the Internet? You are having lunch at a local restaurant outside the installation, and you find a cd labeled "favorite song". Let's not be totally reductive about these things. Workers tend to work alone at highly specialized jobs. Which of these is true of unclassified data?-Its classification level may rise when aggregated. Identification, encryption, and digital signature. Which of the following is NOT a way that malicious code spreads? -TRUE The use of webmail is -is only allowed if the organization permits it Using webmail may bypass built in security features. Those include the effects of increasing the extent of telecommuting, best practices for managers and the relative effectiveness of various communication methods, particularly video, says Golden. Its not so much that telecommuting is good or bad; its just that sometimes its advantageous and sometimes its not, Gajendran says. CUI may be stored on any password-protected system. How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? What should you do? Which of the following HR activities is similar to analyzing a job that does not yet exist? Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. These habits include: For more information, visit theSelf-Assessment & Safety Checklist pages. National Archives & Records Administration, Sufficient portable work for the amount of telework proposed, Comfort with the technologies, if any, that will be needed to telework, Good communication with your manager, co-workers, customers that will enable a relatively seamless transition from onsite to offsite, Telework office space that is conducive to getting the work done, Dependent care (i.e., child care, elder care, or care of any other dependent adults) arrangements in place, Ability to be flexible about the telework arrangement to respond to the needs of the manager, the workgroup, and the work, Ability to work with minimal direct supervision, Location of the telework office (e.g., home or another alternative workplace), Equipment inventory (e.g., what the employee is supplying, what the agency is providing, and who is responsible to maintain it), A general overview of the type of work that will be performed while teleworking, Telework contact information (e.g., what phone number to use on the telework day). They are the most difficult to implement for people in managerial or professional jobs. -When using a public device with a card reader, only use your DoD CAC to access unclassified information, Thumb drives, memory sticks, and flash drives are examples of. The state may verify the information. Between 2005 and 2015, the number of U.S. employees who telecommuted increased by 115%. When its done right, telework can improve employee productivity, creativity and morale, psychologists research finds. Social Security Number; date and place of birth; mothers maiden name. -Remove security badge as you enter a restaurant or retail establishment. Fortunately, geographic distance is not destiny, says Wilson, whose research shows that communication and shared identity within a team can mediate the effects of physical separation. [ 8.3.3 - Identify threats and attacks to an acquisition program life cycle . A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complain about the credit card bills that his wife runs up. One analysis showed that the blurring of such boundaries causes remote workers to associate their homes with their work roles as work obligations repeatedly intrude upon family time (Eddleston, K.A., & Mulki, J., Group & Organization Management, Vol. What should you do? Its classification level may rise when aggregated. Which of the following is a good practice to prevent spillage? Which of the following is true about telework? Which of the following is NOT a security best practice when saving cookies to a hard drive? Designing jobs that meet mental capabilities and limitations generally involves _____. **Insider ThreatWhat type of activity or behavior should be reported as a potential insider threat? b. identifying those who might be wasting their talents and not taking school seriously. *INSIDER THREAT*Based on the description below how many potential insider threat indicators are present? B. Remove your security badge after leaving your controlled area or office building. Before allowing employees to work remotely, organizations should reevaluate policies around performance evaluation, promotion and salary increases to ensure they dont favor on-site workers, she says. 0 votes . The flexibility, balanced work-home life and other benefits of telecommuting ultimately work to improve employee morale. But more often, studies show, teleworkers professional obligations tend to extend beyond the traditional workday, interrupting family time and preventing teleworkers from ever truly disconnecting. In terms of the Job Characteristics Model, feedback refers to the extent to which _____. *SPILLAGE*Which of the following may be helpful to prevent spillage? A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. **Classified DataWhat is required for an individual to access classified data? Step 1: Know your Telework Managing Officer and Telework Coordinator All agencies must designate a Telework Managing Officer (TMO), who is the agency's primary contact for policy and program questions. What should you do to protect classified data? How can you guard yourself against Identity theft? A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. The strength of Answer computing and the growth of the mobile digital platform allow organizations to rely more on telework, remote work, and distributed decision making. A work option in which two part-time employees carry out the tasks associated with a single job. You receive a call on your work phone and you're asked to participate in a phone survey. How many potential insiders threat indicators does this employee display? What should you do? In the context of a work flow analysis, materials, equipment, and human resources needed to perform the tasks collectively constitute the _____. telework since the formative period of telework in the 1970's, 1980's and early 1990's [31]. Determine if the software or service is authorized. Which of the following is a good practice to avoid email viruses? *MOBILE DEVICES*Which of the following is an example of removable media? What should you do? SSN, date and place of birth, mothers maiden name, biometric records, PHI, passport number, Subset of PII, health information that identifies the individual, relates to physical or mental health of an individual, provision of health care to an individual, or payment of healthcare for individual. A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. **Social EngineeringWhich of the following is a way to protect against social engineering? Which of the following is true of telework? Of the following, which is NOT a characteristic of a phishing attempt? _____ involves assessing the relative dollar value of each job to the organization in order to set up fair pay structures. When teleworking, you should always use authorized and software. Jacoby recommends that firms get company-wide buy-in for telework and include remote workers in all team- and company-wide events, via video conferencing when necessary. The information that I provide while filling out this online employment application form and completing the application process, including possibly sensitive data, will be transferred online, stored, and processed on a server in the United States of America. **Mobile DevicesWhich is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Step 13: Participate in telework and lead by example Managers and supervisors must be committed to using telework to the fullest extent possible if Federal telework programs are to be successful. (Correct). Others are exploring issues of isolation and overwork, how first-time teleworkers adjust to their new circumstances and which types of employees thrive when working remotely. As a security best practice, what should you do before exiting? if you are a military personnel and you knowingly leaked, information may be cui in accordance with executive order 13526, intentional unauthorized disclosure of classified information, is it permitted to share an unclassified draft document, is press release data sensitive information, is whistleblowing the same as reporting an unauthorized disclosure, near field communication cyber awareness, near field communication cyber awareness 2022, opsec is a dissemination control category, opsec is a dissemination control category within the cui program, penalties for unauthorized disclosure of classified information, relates to reporting of gross mismanagement and/or abuse of authority, requirements to access classified information, the act of publicly documenting and sharing information is called, the whistleblower protection enhancement act relates to reporting, unauthorized disclosure of classified information, unauthorized disclosure of classified information for dod and industry, unauthorized disclosure of information classified as confidential, what can malicious code do cyber awareness challenge, what dod instruction implements the dod program, what is a possible effect of malicious code, what is a possible effect of malicious code cyber awareness, what is a protection against internet hoaxes, what is a protection against internet hoaxes cyber awareness, what is possible effect of malicious code, what is protection against internet hoaxes, what is purpose of the isoo cui registry, what is required for an individual to access classified data, what is sensitive compartmented information cyber awareness 2022, what is the possible effect of malicious code, what is the purpose of isoo cui registry, what is the purpose of the isoo registry, what level of damage can the unauthorized disclosure of information, what security risk does a public wi-fi connection pose, what should the owner of this printed sci do differently, what should you do if you suspect spillage has occurred, what threat do insiders with authorized, what threat do insiders with authorized access to information, what threat do insiders with authorized access to information pose, when can you check personal email on your gfe, when using social networking services the penalties for ignoring requirements, which of the following individuals can access classified data 2022, which of the following is an example of nfc, which of the following is good practice to prevent spillage, which of the following is true about protecting classified data, which of the following is true of protecting classified data, which of the following may help prevent spillage, which of the following may help to prevent spillage, which of the following represents a good physical security practice, which of these is true of unclassified data, whistleblowing should be used to report which of the following, who is responsible for applying cui markings and dissemination instructions. You are logged on to your unclassified computer and just received an encrypted email from a co-worker. Advancing psychology to benefit society and improve lives, Center for Advanced Human Resource Studies, Workplace Redesign: Current Trends, Challenges, and Opportunities, Virtual Teams: Conceptualization, Integrative Review and Research Recommendations. The success of an organization's telework program depends on regular, routine use by employees at all levels. What does Personally Identifiable Information (PII) include? \. Which is a risk associated with removable media? Spear Phishing attacks commonly attempt to impersonate email from trusted entities. But if everybody is getting it, people may value it less, Gajendran says. Understanding and using the available privacy settings. What should you do? Linda encrypts all of the sensitive data on her government-issued mobile devices. -Remove and take it with you whenever you leave your workstation. People choose to work remotely to avoid daily commutes, reduce workplace distractions and fulfill family care responsibilities (Owl Labs State of Remote Work, 2017). In a remote work situation, managers must rely more heavily on results. On the one hand, family and social obligations can easily bleed over into work hours. They support the strategy of corporate social responsibility by reducing an employee's need to commute using a vehicle. Study the diagram of the hemispheres on page 20 . Specifically, we focus on leaders who manage team members based in remote sites and/or telework one or more days each week. Never allow sensitive data on non-Government-issued mobile devices. -Look for a digital signature on the email. You must have permission from your organization. Using OPM's Open Season Online system. Answers: Apples, pears, oranges, bananas. degree to which a job requires completing a whole piece of work from beginning to end. The task force has created guidelines for the companys managers and employees who telework, drawing on research on work-family conflict (Greer, T.W., & Payne, S.C., The Psychologist-Manager Journal, Vol. Use the classified network for all work, including unclassified work. After clicking on a link on a website, a box pops up and asks if you want to run an application. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. The study of the interface between individuals physiology and the characteristics of the physical work environment. Which of the following is NOT an example of sensitive information? Discuss the difference. A telework arrangement is the easiest to set up for manufacturing workers. TMOs will often work with a Telework Coordinator on the day-to-day operational aspects of telework. -Delete email from senders you do not know. The following pairs of investment plan are identical except for a small difference in interest rates. For some, operating from a co-working spacea shared office that provides telecommuters and freelancers with internet access, meeting rooms and other amenitiescan help address social isolation. whether the employee is expected to work during agency closures or other Continuity of Operations (COOP) related emergencies or situations that may result in a disruption to normal office operations). With regard to COOP, note that Emergency Relocation Group (ERG) members must be prepared to telework at any time. *WEBSITE USE*Which of the following statements is true of cookies? Answer The answer will depend largely on the requirements of your individual agency, the agency telework policy, and your manager. Which of the following is NOT a correct way to protect sensitive information? In the Job Characteristics Model, task identity is defined as the _____. Employees who are teleworking should assess the portability of their work and the level of technology available at the remote site as they prepare to telework. children or elderly relatives. b. Construct the confidence interval at 95% for the mean difference between the two populations. A coworker has asked if you want to download a programmers game to play at work. What is a possible indication of a malicious code attack in progress? To make jobs less repetitive and more interesting. How many potential insiders threat . You can email your employees information to yourself so you can work on it this weekend and go home now. Which of the following is an invalid guideline for securing telework computers and laptops , per the National Institute of Standards and Technology ( NIST ) Special Publication ( SP ) 800-114 ? Supervisory Position: Computer programmers, travel agents and tech support personnel only need a telephone and a computer with internet access to do . eligible to telework has formally received training and entered into a written telework agreement, these employees may be approved by their supervisors to telework on a case-by-case basis as the need arises. The Cambridge Handbook of Technology and Employee Behavior, Cambridge University Press 2019, Digital Nomads: The Final Frontier of Work Arrangements? What action should you take? d. evaluating the quality of French schools. It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. One study found that teams with one large and multiple smaller subgroups tend to develop an ingroup-outgroup mentality and experience more conflict and coordination problems, whereas teams with individual members who are geographically isolated report fewer such problems (OLeary, M.B., & Mortensen, M., Organization Science, Vol. How many potential insiders threat indicators does this employee display? What should the participants in this conversation involving SCI do differently? Be aware of classification markings and all handling caveats. *SpillageWhat is a proper response if spillage occurs? Duties. *INSIDER THREAT*Which of the following is NOT considered a potential insider threat indicator? In many cases this is true. -After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. What describes how Sensitive Compartmented Information is marked? What should you do to protect yourself while on social networks? As our readers might expect, new guidance from the Department of Labor and recent . Software that install itself without the user's knowledge. Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. In a study of 273 teleworkers from sales, marketing, accounting, engineering and other departments at one organization, Gajendran and Golden found that employees whose jobs were highly complex but did not require significant collaboration or social support performed better when telecommuting than when working in the companys office (Journal of Business and Psychology, Vol. What other steps should I take before I leave my office (e.g., forwarding the phone)? What should you do? Contact the IRS using their publicly available, official contact information. -Use the government email system so you can encrypt the information and open the email on your government issued laptop. Gajendran and his colleagues found that teleworkers often go above and beyondfor instance, by responding to emails outside of work hoursto demonstrate their organizational commitment (Personnel Psychology, Vol. What should be your response? Your health insurance explanation of benefits (EOB). Interestingly, the growing popularity of remote work could end up dampening its benefits, suggests research by Gajendran. - CUI is an umbrella term that encompasses many different markings to identify information that is not classified but which should be protected. Telework is here to stay, says industrial/organizational (I/O) psychologist Timothy Golden, PhD, professor and area coordinator of enterprise management and organization at, Rensselaer Polytechnic Institute in Troy, New York. *SENSITIVE COMPARTMENTED INFORMATION*When faxing Sensitive Compartmented Information (SCI), what actions should you take? These requirements constitute the _____. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. She comes across an advertisement in a newspaper seeking applications for the post of an HR manager. Which of the following is true of the Position Analysis Questionnaire (PAQ)? Companies that have backtracked on remote worksuch as Yahoo and IBMmake headlines because theyre outliers in the general trend toward teleworking, says Bell. The way teams are configuredthe number and distribution of members and sitesalso matters. Which is NOT a way to protect removable media? A minimum of two (2) years of maintenance or construction semi-skilled work experience in skilled trades such as mechanical (HVAC and Plumbing), electrical, carpentry, with significant focus on building systems. Within a secure area, you see an individual you do not know. Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. For the current COVID-19 Requirements please visit the following link. Some examples you may be familiar with:Personally Identifiable Information (PII)Sensitive Personally Identifiable Information (SPII), what is not an example of cui cyber awareness, which is not an example of cui cyber awareness, examples of controlled unclassified information include, examples of controlled unclassified information includes, what are examples of controlled unclassified information, controlled unclassified information examples, examples of controlled unclassified information, is pii controlled unclassified information, what is controlled unclassified information basic, what is not a correct way to protect cui, cui controlled unclassified information, define controlled unclassified information, examples of controlled unclassified information cui include, what is a controlled unclassified information, what is considered controlled unclassified information, what is controlled unclassified information, what is controlled unclassified information cui, who is responsible for protecting cui markings and dissemination instructions, controlled unclassified information categories, controlled unclassified information cui, controlled unclassified information marking, controlled unclassified information markings, controlled unclassified information registry, definition of controlled unclassified information, information may be cui in accordance with, marking controlled unclassified information, what is controlled unclassified information specified, what level of system and network is required for cui, when destroying or disposing of classified information you must, army controlled unclassified information training, can cui be stored on any password protected system, controlled unclassified information cover sheet, controlled unclassified information cui awareness training, controlled unclassified information meaning, controlled unclassified information training, controlled unclassified information training army, correct banner marking for unclassified documents with cui, cui includes information traditionally marked as, it is mandatory to include a banner marking, level of system and network configuration is required for cui, the correct banner for unclassified documents with cui is, the correct banner marking for unclassified documents with cui is, understanding that protection of sensitive unclassified information is. Which of the following is an important managing-by-results guideline to implement Praise in public, criticize in private Developing a structured work plan includes All of the above All of the following are important pieces of a communication plan EXCEPT Of-site meetings that a teleworker would attend in person All of the following are reminders about telework agreements EXCEPT Should not be . DoD employees are prohibited from using a DoD CAC in card-reader-enabled public devices. For more information about agency-based telework training and/or information technology training, please consult your agency Telework Coordinator or TMO. *Sensitive InformationWhat type of unclassified material should always be marked with a special handling caveat?