How are compensating balances reported in financial statements? WINDOWPANE is the live-streaming app for sharing your life as it happens, without filters, editing, or anything fake. Which of the following is true of telework? [ 8.3.3 - Identify threats and attacks to an acquisition program life cycle . You are working at your unclassified system and receive an email from a coworker containing a classified attachment. All https sites are legitimate and there is no risk to entering your personal info online. What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? Bob, a coworker, has been going through a divorce, has financial difficulties and is displaying hostile behavior. When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. *SpillageWhat is a proper response if spillage occurs? asked May 31, 2022 in Other by Kamal (64.9k points) Which of the following is true about telework? A coworker brings a personal electronic device into prohibited areas. Of the following, which is NOT an intelligence community mandate for passwords? CUI may be stored on any password-protected system. We are a customer driven technology division that provides innovative solutions that connects people and simplifies work. Which of the following is true of protecting classified data? Your comments are due on Monday. Before long she has also purchased shoes from several other websites. The process of getting detailed information about jobs is known as _____. What other steps should I take before I leave my office (e.g., forwarding the phone)? What should you do? Step 13: Participate in telework and lead by example Managers and supervisors must be committed to using telework to the fullest extent possible if Federal telework programs are to be successful. z To protect the information on your CAC, you should never tell anyone your PIN or write it down where it can be easily found. In another line of research, psychologists are exploring how to maximize the efficiency and productivity of teams that are geographically dispersed. Which type of information includes personal, payroll, medical, and operational information? As part of the telework arrangement, be clear about when teleworkers are expected to be completing tasks and when they should be responsive to incoming calls or emails. Helen is utilizing a flexible work schedule option known as _____. What is NOT Personally Identifiable Information (PII)? includes a one-time $200 Amazon allowance for ordering at-home office equipment or preferred supplies to support the telework experience. What information most likely presents a security risk on your personal social networking profile? The future of remote work. Additionally, when employees are happy, the . *PHYSICAL SECURITY*At which Cyberspace Protection Condition (CPCON) is the priority focus on critical and essential functions? Do not access links or hyperlinked media such as buttons and graphics in email messages. Which of the following is the process of getting oxygen from the environment to the tissues of the body? Which type of information includes personal, payroll, medical, and operational information? Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? Which of the following is an example of malicious code? Store it in a General Services Administration (GSA)-approved vault or container. What information should you avoid posting on social networking sites? You receive a call on your work phone and you're asked to participate in a phone survey. answered May 31, 2022 by Haren (305k points) Best answer. (Wrong). (Ed.) What action should you take first? Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? Many workers view telecommuting as a job perk, with more than half seeking the arrangement as a way to improve work-life balance. *SOCIAL NETWORKING*When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? Quickly and professionally. *Sensitive InformationWhich of the following is the best example of Personally Identifiable Information (PII)? Always use DoD PKI tokens within their designated classification level. Which of the following is true about knowledge, skills, abilities, and other characteristics (KSAOs) that are required for a job? He lets the staff decide whether to issue refunds or replace merchandise in case of consumer grievances. 8 The review of the successes and the mistakes is normally held during _____ phase. Which of the following is NOT a good way to protect your identity? c. Interpret the results in (a) and (b). Which of the following is not a step in the process of measuring external transactions? Store classified data appropriately in a GSA-approved vault/container. In addition to formally exploring any cultural or ideological differences, collaborators should also consider how such teams are led. Is it okay to run it? What action is recommended when somebody calls you to inquire about your work environment or specific account information? Reducing the physical strain on employees performing the job. It all depends on the context.. Store it in a shielded sleeve to avoid chip cloning. Which of the following is a true statement? You receive an email from a company you have an account with. Which of the following is true about telework? They support the strategy of corporate social responsibility by reducing an employee's need to commute using a vehicle. Which of the following is an appropriate course of action while formulating job descriptions? -Look for a digital signature on the email. -It never requires classification markings. When teleworking, you should always use authorized and software. -Using NIPRNet tokens on systems of higher classification level. When using your home network to telework, an unsecured IoT device could become an attack vector to any attached government-furnished equipment (GFE). As a security best practice, what should you do before exiting? Geotagging posts using Global Positioning System (GPS) or location links Accepting all information posted by your network as true ~Understanding and using the available privacy settings Connecting with people who share mutual connections with you, even if you don't know them **Social Networking There are many travel tips for mobile computing. After clicking on a link on a website, a box pops up and asks if you want to run an application. Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. In the early twentieth century, French psychologists led by Alfred Binet developed the first test for intelligence to be given to French school children for the purpose of a. selecting the most capable to be turned as future leaders. A coworker uses a personal electronic device in a secure area where their use is prohibited. It can be most beneficial to simplify jobs where _____. 1 Answer 0 votes answered by admic (1.0m points) selected by voice Best answer You must have your organization's permission to telework National Archives & Records Administration, Sufficient portable work for the amount of telework proposed, Comfort with the technologies, if any, that will be needed to telework, Good communication with your manager, co-workers, customers that will enable a relatively seamless transition from onsite to offsite, Telework office space that is conducive to getting the work done, Dependent care (i.e., child care, elder care, or care of any other dependent adults) arrangements in place, Ability to be flexible about the telework arrangement to respond to the needs of the manager, the workgroup, and the work, Ability to work with minimal direct supervision, Location of the telework office (e.g., home or another alternative workplace), Equipment inventory (e.g., what the employee is supplying, what the agency is providing, and who is responsible to maintain it), A general overview of the type of work that will be performed while teleworking, Telework contact information (e.g., what phone number to use on the telework day). Companies should never just implement telecommuting without changing anything else, says I/O psychologist Kristen Shockley, PhD, an associate professor at the University of Georgia. inputs used in the development of the work unit's product. According to Herzbergs two-factor theory, which of the following factors would motivate individuals the most? What should be your response? -Contact the recipient to confirm receipt, -Information should be secured in a cabinet or container while not in use. 22, No. In another example of research-informed telecommuting, Kaila Jacoby, a consultant with a masters degree in I/O psychology, leads a work-from-home task force at DCI Consulting, a human resources risk-management consulting firm in Washington, D.C. Connect with others, with spontaneous photos and videos, and random live-streaming. Does OPM provide employee and/or manager training that agencies . Which of the following is NOT a typical result from running malicious code? Advancing psychology to benefit society and improve lives, Center for Advanced Human Resource Studies, Workplace Redesign: Current Trends, Challenges, and Opportunities, Virtual Teams: Conceptualization, Integrative Review and Research Recommendations. Before allowing employees to work remotely, organizations should reevaluate policies around performance evaluation, promotion and salary increases to ensure they dont favor on-site workers, she says. . **Insider ThreatWhat advantages do insider threats have over others that allows them to cause damage to their organizations more easily? **Mobile DevicesWhich is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? The Act mandates that each teleworker and his/her manager must enter into a written agreement for every type of telework, whether the employee teleworks regularly or not. Spillage because classified data was moved to a lower classification level system without authorization. Its classification level may rise when aggregated. whether the employee is expected to work during agency closures or other Continuity of Operations (COOP) related emergencies or situations that may result in a disruption to normal office operations). What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? Mark SCI documents appropriately and use an approved SCI fax machine. Additionally the National Archives & Records Administration provides guidance to agencies and their employees that applies to Federal records in a telework environment on NARA's FAQs about Telework. Who can be permitted access to classified data? Which of the following is a practice that helps to protect you from identity theft? How many potential insiders threat indicators does this employee display? The study of the interface between individuals physiology and the characteristics of the physical work environment. 50, No. Which of the following job design techniques does Carl implement in his store? -Directing you to a web site that is real. e. finding children who were struggling academically. Store it in a General Services Administration (GSA)-approved vault or container Based on the description that follows, how many potetntial insider threat indicator (s) are displayed? Linda encrypts all of the sensitive data on her government-issued mobile devices. *INSIDER THREAT*What threat do insiders with authorized access to information or information systems pose? An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? What should be your response? 17, No. Teleworkers also appear to work more. 6 The scope of the work is defined in which phase of the project management? weegy. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. Job descriptions generally contain all of the following components EXCEPT _____. Which of the following demonstrates proper protection of mobile devices? One can be at the same time appreciative of the need to include what to do under a threat of violence in employee training and viscerally opposed to the kind of active shooter drills that are currently en vogue. Specifically, we focus on leaders who manage team members based in remote sites and/or telework one or more days each week. Connect to the Government Virtual Private Network (VPN). You are reviewing your employees annual self evaluation. Job enrichment differs from job rotation in that job enrichment: empowers workers by adding more decision-making authority to their jobs. **Physical SecurityAt which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? The state may verify the information. Telework can give employees more control over their schedules and flexibility in meeting personal and professional responsibilities. *Sensitive Compartmented InformationWhen should documents be marked within a Sensitive Compartmented Information Facility (SCIF), ~All documents should be appropriately marked, regardless of format, sensitivity, or classification.Unclassified documents do not need to be marked as a SCIF.Only paper documents that are in open storage need to be marked.Only documents that are classified Secret, Top Secret, or SCI require marking. Which of the following is NOT a typical means for spreading malicious code? For example, the EPA confirmed a year-to-year drop of over 30% in pollution levels in San Francisco following the shelter-in-place order. Which of the following is true about telework? -Use TinyURL's preview feature to investigate where the link leads. Employees should consider the following factors in making an honest determination about their telework capabilities: Additionally, to be a successful teleworker you need to have work habits that support independent task performance. "Telework is a work arrangement that allows an employee to perform work during any part of regular, paid hours, at an approved alternative worksite (e.g., home or telework center). **Social NetworkingWhat should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sires visited? Which of the following best describes ergonomics? Insiders are given a level of trust and have authorized access to Government information systems. On a NIPRNET system while using it for a PKI-required task. But the impact of such arrangements on productivity, creativity and morale has been . -Ask them to verify their name and office number. To secure IoT devices: Examine the default security options available Enable any security features Set a robust password at the device's maximum length, if possible *SpillageWhat should you do if a reporter asks you about potentially classified information on the web? Remove your security badge after leaving your controlled area or office building. She comes across an advertisement in a newspaper seeking applications for the post of an HR manager. *SpillageWhich of the following is a good practice to aid in preventing spillage? Which of the following is NOT one? -After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. Which of the following is an example of Protected Health Information (PHI)? *SPILLAGE*Which of the following may be helpful to prevent spillage? You will get the details of all company-provided materials room & # x27 ; s cables nearest Canada Personnel management offers online telework training before they can telework shows the technical requirements - Oracle /a >. What should you do? Still, he says, companies that offer telework arrangements strategicallyby making it contingent upon hitting performance targets, for instancemay be able to avoid such pitfalls. Employers can hire geographically distributed talent and reduce overhead expenses, while employees can gain flexibility, save time, and reduce transportation and some child-care costs.