Verified answer. Use your own facility access badge or key code. But that's generally how we use "which of the following.". These updated FAQs were released to the public in Fact Sheet 2022-16 PDF, March 3, 2022.. National Archives & Records Administration, Sufficient portable work for the amount of telework proposed, Comfort with the technologies, if any, that will be needed to telework, Good communication with your manager, co-workers, customers that will enable a relatively seamless transition from onsite to offsite, Telework office space that is conducive to getting the work done, Dependent care (i.e., child care, elder care, or care of any other dependent adults) arrangements in place, Ability to be flexible about the telework arrangement to respond to the needs of the manager, the workgroup, and the work, Ability to work with minimal direct supervision, Location of the telework office (e.g., home or another alternative workplace), Equipment inventory (e.g., what the employee is supplying, what the agency is providing, and who is responsible to maintain it), A general overview of the type of work that will be performed while teleworking, Telework contact information (e.g., what phone number to use on the telework day). Which of the following is NOT a DoD special requirement for tokens? When vacation is over, after you have returned home. Alert box notification is currently enabled, please, Official Website of the U.S. Office of Personnel Management, follow this link to enable alert boxes for your session profile, follow this link to disable alert boxes for your session profile, Telework Managing Officers & Coordinators, Virtual Telework Fundamentals Training Courses, Telework and Performance Management Webcast Trainings, Enhancing Workplace Flexibilities and Work-Life Programs. *Sensitive Compartmented InformationWhich of the following best describes the compromise of Sensitive Compartmented Information (SCI)? When is it appropriate to have your security badge visible? Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. *SOCIAL ENGINEERING*How can you protect yourself from social engineering? Explain a compensating balance. Teleworkers operating from a home office lack the physical and psychological separation between these two domains that exists in a traditional office setting, says Golden. Classified material must be appropriately marked. Approved Security Classification Guide (SCG). Which of the following is NOT an appropriate way to protect against inadvertent spillage? Our technology solutions impact other state agencies, counties, cities, and the people of Washington. They also need to shift their culture and norms to support the new arrangement.. What information most likely presents a security risk on your personal social networking profile? You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). Reducing the physical strain on employees performing the job. weegy. On a NIPRNet system while using it for a PKI-required task. -Validate all friend requests through another source before confirming them. To secure IoT devices: Examine the default security options available Enable any security features Set a robust password at the device's maximum length, if possible *WEBSITE USE*Which of the following statements is true of cookies? What can you do to protect yourself against phishing? 1 Answer. Store it in a General Services Administration (GSA)-approved vault or container. People who teleworked also tended to experience less work stress or exhaustion. Which of the following is true of telework? One study found that teams with one large and multiple smaller subgroups tend to develop an ingroup-outgroup mentality and experience more conflict and coordination problems, whereas teams with individual members who are geographically isolated report fewer such problems (OLeary, M.B., & Mortensen, M., Organization Science, Vol. In June 2014, President Obama issued a Presidential Memorandum entitled, Enhancing Workplace Flexibilities and Work-Life Programs, as a way to help attract, empower and retain a talented and productive workforce in the 21st century. Remote work (or working remotely) is often considered to be an arrangement where employers require workers to work somewhere other than at the designated worksite because of temporary unforeseeable circumstances, such as pandemics, states of emergency, or inclement weather. The website requires a credit card for registration. **Insider ThreatWhich of the following should be reported as a potential security incident (in accordance with you Agencys insider threat policy)? Which of the following is an example of Protected Health Information (PHI)? **Identity managementWhat is the best way to protect your Common Access Card (CAC)? Some early adoptersincluding Best Buy, IBM and Yahooare even reversing policies that once allowed employees to telecommute, citing leadership changes and a growing need for creative collaboration. The research has generally shown that for most outcomes, remote work leads to small but tangible benefits, says I/O psychologist Bradford Bell, PhD, professor and director of the Center for Advanced Human Resource Studies (CAHRS) at Cornell University. What is the result of an organization structure that is strongly based on function? results in abstract reports that are of limited use. All agencies must designate a Telework Managing Officer (TMO), who is the agency's primary contact for policy and program questions. Which of the following is NOT an example of CUI? A type of phishing targeted at high-level personnel such as senior officials. -Looking for "https" in the URL. Required. For example, the EPA confirmed a year-to-year drop of over 30% in pollution levels in San Francisco following the shelter-in-place order. T/F. A manager of a revenue center is responsible for all of the following EXCEPT a. service quality and units sold. -It is inherently not a secure technology. Ask for information about the website, including the URL. Which of the following is true of Internet hoaxes? Also, information technology security training is mandatory at the agency level, and teleworkers must complete this training and understand their responsibilities in safeguarding work-related information. In a study of 733 work relationships among colleagues from a variety of industries, she found that relationship quality was more closely tied to perceived proximityor relational closenessthan it was to physical proximity (OLeary, M.B., et al., MIS Quarterly, Vol. In many cases this is true. There are many travel tips for mobile computing. Note any identifying information and the website's Uniform Resource Loctaor (URL). Which is NOT a method of protecting classified data? Discuss the difference. **Physical SecurityWhat is a good practice for physical security? Only allow mobile code to run from your organization or your organizations trusted sites. And such remote work can benefit both employers and employees, experts say. She comes across an advertisement in a newspaper seeking applications for the post of an HR manager. In another line of research, psychologists are exploring how to maximize the efficiency and productivity of teams that are geographically dispersed. **Identity ManagementWhich of the following is the nest description of two-factor authentication? A coworker uses a personal electronic device in a secure area where their use is prohibited. Researchers already know a lot about how to coordinate behavior and motivate people working in face-to-face teams, says Kozlowski. 2, 2015). Which of following is true of protecting classified data? TERMS AND CONDITIONS By creating an account (login and password), I understand and expressly consent to the following:. When would be a good time to post your vacation location and dates on your social networking website? You have reached the office door to exit your controlled area. At that time, you may be eligible to continue to telework or work remotely two or more days a pay period consistent with the Census Bureau's flexible telework and remote work policies and approval from your supervisor. What files or other documents will I need to take with me when I leave my regular workplace the day before teleworking? *HOME COMPUTER SECURITY*Which of the following is a best practice for securing your home computer? Employers may see these outcomes as positive, translating into higher productivity and better workplace citizenship. You DoD Common Access Card has a Public Key Infrastructure (PKI) token approved fro access to the Non-classified Internet Protocol Router Network (NIPRNet). How can you guard yourself against Identity theft? Your health insurance explanation of benefits (EOB). Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. A results-oriented performance culture system focuses on having a diverse, results-oriented, high-performing workforce, as well as a performance management system that effectively plans, monitors, develops, rates, and rewards employee performance. Shockley, K. Society for Industrial and Organizational Psychology, 2014. Which of the following is NOT a typical result from running malicious code? All https sites are legitimate and there is no risk to entering your personal info online. -is only allowed if the organization permits it. Which of the following attacks target high ranking officials and executives? The telework agreement should specify what equipment and/or expenses will be covered by the agency, employee, or shared. Which of the following is true about telework? In the U.S., interest in telework spiked following the events of 9/11 and the anthrax attacks that soon followed, which forced several key government offices to close. A pop-up window that flashes and warns that your computer is infected with a virus. **Home Computer SecurityHow can you protect your information when using wireless technology? In a study of 273 teleworkers from sales, marketing, accounting, engineering and other departments at one organization, Gajendran and Golden found that employees whose jobs were highly complex but did not require significant collaboration or social support performed better when telecommuting than when working in the companys office (Journal of Business and Psychology, Vol. Which of the following HR activities is similar to analyzing a job that does not yet exist? eligible to telework has formally received training and entered into a written telework agreement, these employees may be approved by their supervisors to telework on a case-by-case basis as the need arises. Drawbacks included social and professional isolation, fewer opportunities for information sharing and a blurring of boundaries between work and personal life (Allen, T.D., et al., Psychological Science in the Public Interest, Vol. But more often, studies show, teleworkers professional obligations tend to extend beyond the traditional workday, interrupting family time and preventing teleworkers from ever truly disconnecting. -Following instructions from verified personnel. *INSIDER THREAT*What threat do insiders with authorized access to information or information systems pose? Level I Antiterrorism Awareness Training - (2, Cyber Awareness Challenge 2022 Knowledge Check, John David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine, Operations Management: Sustainability and Supply Chain Management, Organizational Behavior: Managing People and Organizations, Jean Phillips, Ricky W. Griffin, Stanley Gully, Patient Care - Infection Control & management. Trust among team members starts lower in virtual teams than in face-to-face teams, but over time, it can build to the same levels, she says. In addition to formally exploring any cultural or ideological differences, collaborators should also consider how such teams are led. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. Which of the following is true of the International Organization for Standardization? You can email your employees information to yourself so you can work on it this weekend and go home now. Is it okay to run it? How many potential insider threat indicators is Bob displaying? Something you possess, like a CAC, and something you know, like a PIN or password. -Using NIPRNet tokens on systems of higher classification level. In an ongoing effort known as the University of Michigan Coworking Project, a team of researchers has used surveys, interviews and participatory observations to show that such spaces can create a sense of community without threatening remote workers prized autonomy (Garrett, L.E., et al., Organization Studies, Vol. *REMOVABLE MEDIA IN A SCIF*What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? Others are exploring issues of isolation and overwork, how first-time teleworkers adjust to their new circumstances and which types of employees thrive when working remotely. Who can be permitted access to classified data? Your comments are due on Monday. It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. What is considered a mobile computing device and therefore shouldn't be plugged in to your Government computer? You can find your Telework Coordinator by searching OPM's Telework Contact Tool. WINDOWPANE is the live-streaming app for sharing your life as it happens, without filters, editing, or anything fake. A coworker removes sensitive information without authorization. They support the strategy of corporate social responsibility by reducing an employee's need to commute using a vehicle. A man you do not know is trying to look at your Government-issued phone and has asked to use it. A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. The potential for unauthorized viewing of work-related information displayed on your screen. When using your government-issued laptop in public environments, with which of the following should you be concerned? In terms of the Job Characteristics Model, feedback refers to the extent to which _____. Which of the following is an example ofmalicious code? For more information, review the Security & IT Guidance. **Classified DataWhat is a good practice to protect classified information? In most organizations, telecommuting is not a right; its a privilege that you earn. Golden affirms that coworking spaces may alleviate social isolation, but its unclear whether they address the professional isolation that out-of-office employees tend to experience, he says. Companies should never just implement telecommuting without changing anything else, says I/O psychologist Kristen Shockley, PhD, an associate professor at the University of Georgia. But experts say that without firmer boundaries, employees can experience exhaustion and burnout and that such overwork should be discouraged by managers and organizations. Quickly and professionally. According to Herzbergs two-factor theory, which of the following factors would motivate individuals the most? Kio invests $500\$ 500$500 in a different account that earns 3.75%3.75 \%3.75% compounded annually. Which of the following is true of telework? Which of the following is true about telework? How many potential insiders threat indicators does this employee display? Employees must take responsibility for the security of the data and other information they handle while teleworking. You must have permission from your organization How should you protect a printed classified document when it is not in use? *MALICIOUS CODE*Which of the following is NOT a way malicious code spreads? *SpillageWhich of the following may help prevent inadvertent spillage? In todays global economy, virtual teams can be distributed across different offices or departments in a single organization or they can span time zones, industries and national borders. Which of these is true of unclassified data?-Its classification level may rise when aggregated. Which of the following is the objective of job enlargement? Step 1: Know your Telework Managing Officer and Telework Coordinator All agencies must designate a Telework Managing Officer (TMO), who is the agency's primary contact for policy and program questions. *Sensitive Compartmented InformationWhat is a Sensitive Compartmented Information (SCI) program? ~A coworker brings a personal electronic device into a prohibited area. -Make note of any identifying information and the website URL and report it to your security office. Now, to learn more about telecommuting and its implications for the future of work, psychologists are studying remote works benefits, drawbacks and best practices. Carla Warne is an HR executive looking for a new job. The Act mandates that each teleworker and his/her manager must enter into a written agreement for every type of telework, whether the employee teleworks regularly or not. Which of the following is true about knowledge, skills, abilities, and other characteristics (KSAOs) that are required for a job? Which is NOT a way to protect removable media? Be aware of classification markings and all handling caveats. Which of the following job analysis methods requires subject-matter experts to evaluate a job in terms of abilities required to perform the job? What can be used to track Maria's web browsing habits? In which situation below are you permitted to use your PKI token? 6 The scope of the work is defined in which phase of the project management? Which of the following is NOT a typical result from running malicious code? It is a worldwide federation of national standards bodies from 161 countries The OLPC XO-4 runs a Windows-based operating system FALSE A successful defense against a product liability case is typically expensive in terms of legal fees TRUE In the early twentieth century, French psychologists led by Alfred Binet developed the first test for intelligence to be given to French school children for the purpose of a. selecting the most capable to be turned as future leaders. *INSIDER THREAT*Based on the description below how many potential insider threat indicators are present? A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Phishing can be an email with a hyperlink as bait. When checking in at the airline counter for a business trip. The task force has created guidelines for the companys managers and employees who telework, drawing on research on work-family conflict (Greer, T.W., & Payne, S.C., The Psychologist-Manager Journal, Vol. [ 8.3.3 - Identify threats and attacks to an acquisition program life cycle . What is the best course of action? Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Jane JonesSocial security number: 123-45-6789, Select the information on the data sheet that is protected health information (PHI). the details of pay and benefits attached to the job. which of the following is true of telework If authorized, what can be done on a work computer? The strength of Answer computing and the growth of the mobile digital platform allow organizations to rely more on telework, remote work, and distributed decision making. What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited? Step 13: Participate in telework and lead by example Managers and supervisors must be committed to using telework to the fullest extent possible if Federal telework programs are to be successful. But the impact of such arrangements on productivity, creativity and morale has been up for debate, primarily because working from home offers employees fewer opportunities to talk and network with their colleagues. Upon connecting your Government- issued laptop to a public wireless connection, what should you immediately do? Knowledge workers such as computer programmers who can do most of their work on a laptoptasks like creating software code, reports or spreadsheetsand people whose productivity is easily monitored, such as insurance claims adjusters or call center workers, are the most likely to telecommute, says Ravi Gajendran, PhD, assistant professor in the department of global leadership and management at Florida International University. Depending on the sensitivity of the information being handled, the home office may need to include security measures such as locked file cabinets, similar to what may be used at the official worksite. A 2013 Gallup poll found that teleworkers log an extra four hours per week on average compared with their counterparts in the office. On the public health side, an estimated 50 million people with telework-compatible positions would prevent 95,000 traffic-related injuries and deaths per year and save more than $11 billion. Which of the following is NOT Protected Health Information (PHI)? -You must have your organization's permission to telework. Which of the following best describes wireless technology?