Employees should consider the following factors in making an honest determination about their telework capabilities: Additionally, to be a successful teleworker you need to have work habits that support independent task performance. *Sensitive InformationWhat type of unclassified material should always be marked with a special handling caveat? Insiders are given a level of trust and have authorized access to Government information systems. 17, No. A manager of a revenue center is responsible for all of the following EXCEPT a. service quality and units sold. Phishing can be an email with a hyperlink as bait. *UNCONTROLLED CLASSIFIED INFORMATION*Which of the following is NOT a correct way to protect CUI? Telework can give employees more control over their schedules and flexibility in meeting personal and professional responsibilities. When done well, remote work has the potential to improve performance, increase employee satisfaction and benefit a business., Supporting Virtual Collaborations A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. Some employees work from home a few days a month, some a few days a week and some full timeand the extent of a workers telecommuting can dictate his or her experience. HIRING PREFERENCE SELECTION PROCESS: Applicants in the following hiring preference categories are extended a hiring preference in the . Social Security Number; date and place of birth; mothers maiden name. A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. a) A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. A 2013 Gallup poll found that teleworkers log an extra four hours per week on average compared with their counterparts in the office. The state may verify the information. -If aggregated, the classification of the information may not be changed. identify the correct and incorrect statements about executive orders. Which of the following is NOT a requirement for telework? C. PAQ ratings cannot be used to compare dissimilar jobs. If you are interested in teleworking, or already telework but want to ensure you become a more effective teleworker, here are the key steps to success. Which of the following is true about telework? Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Jane JonesSocial security number: 123-45-6789, Select the information on the data sheet that is protected health information (PHI). You must have permission from your organization How should you protect a printed classified document when it is not in use? Explain a compensating balance. 92, No. If possible, set your browser preferences to prompt you each time a website wants to store a cookie. The mood boost and the overall increase in satisfaction of employees who work from home in turn cycles back to increased levels of productivity and improved work performance. This article will provide you with all the questions and answers for Cyber Awareness Challenge. About the Telework Exchange, LLC The Telework Exchange is an online community focused on demonstrating the tangible value of telework and serving the emerging educational and communication. Which of the following is not a step in the process of measuring external transactions? Which of the following does NOT constitute spillage? What should you do if someone asks to use your government issued mobile device (phone/laptop..etc)? whether the employee is expected to work during agency closures or other Continuity of Operations (COOP) related emergencies or situations that may result in a disruption to normal office operations). After you have returned home following the vacation. Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. Which of the following best describes wireless technology? In a 2015 research review, Golden and his colleagues found that, overall, telecommuting increased job satisfaction, performance and feelings of commitment to an organization among employees. It can be most beneficial to simplify jobs where _____. The Telework Enhancement Act defines telework or teleworking as a work flexibility arrangement under which an employee performs the duties and responsibilities of such employee's position, and other authorized activities, from an approved worksite other than the location from which the employee would otherwise work. Workers tend to work alone at highly specialized jobs. **Physical SecurityAt which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? Which of the following is true of protecting classified data? Which of the following is a best practice for handling cookies? Which of the following is NOT sensitive information? 0 votes . Examples are: Patient names, Social Security numbers, Drivers license numbers, insurance details, and birth dates. Which of the following is NOT Protected Health Information (PHI)? Compute the balances in both accounts after 101010 and 303030 years. **Insider ThreatWhich of the following should be reported as a potential security incident (in accordance with you Agencys insider threat policy)? The potential for unauthorized viewing of work-related information displayed on your screen. P2P (Peer-to-Peer) software can do the following except: -Allow attackers physical access to network assets. The U.S. Office of Personnel Management offers online telework training. -Senior government personnel, military or civilian. The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. Very High DoD Risk Level; Priority Critical Functions, High DoD Risk Level; Priority Critical and Essential Functions, Decline to let the person in and redirect her to security. Using webmail may bypass built in security features. Determine if the software or service is authorized. **Use of GFEUnder what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? Classified material must be appropriately marked. Employees should maintain frequent contact with their Telework Coordinator to be sure they follow policy and procedures, and for support and assistance should it be needed. -Monitor credit card statements for unauthorized purchases. (Wrong). Label all files, removable media, and subject headers with appropriate classification markings. Which of these is true of unclassified data? 0 votes . Employers may see these outcomes as positive, translating into higher productivity and better workplace citizenship. What information relates to the physical or mental health of an individual? The following chart, . Mak, S., & Kozlowski, S.W.J., In Landers, R.N. Prepare a new job description whenever a new job is created in the organization. To make jobs less repetitive and more interesting. But that's generally how we use "which of the following.". *Sensitive InformationWhich of the following is an example of Protected Health Information (PHI)? -Classified material must be appropriately marked. ~A coworker brings a personal electronic device into a prohibited area. *MALICIOUS CODE*Which of the following is NOT a way malicious code spreads? . What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? As long as the document is cleared for public release, you may share it outside of DoD. In a remote work situation, managers must rely more heavily on results. Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)? Which of the following is a good practice to avoid email viruses? When vacation is over, after you have returned home. D. Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. The Act mandates that each teleworker and his/her manager must enter into a written agreement for every type of telework, whether the employee teleworks regularly or not. A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. On the public health side, an estimated 50 million people with telework-compatible positions would prevent 95,000 traffic-related injuries and deaths per year and save more than $11 billion. You are working at your unclassified system and receive an email from a coworker containing a classified attachment. While planning, employees shouldconsider the following questions: Although managers are ultimately responsible for the healthy functioning of the workgroup, teleworkers must help manage the group's expectations and their own communication in order to avoid any negative impact on the morale or productivity of non-teleworkers. You can find your Telework Coordinator by searching OPM's Telework Contact Tool. In the 1970's the objective of telecommuting was to avoid traffic, that is, it was closely associated with transportation [32]. Back to top In a survey his team conducted, nearly all companies interviewed said they intend to continue offering teleworking or expand its use in the future (Workplace Redesign: Current Trends, Challenges, and Opportunities, CAHRS White Paper, 2019). Investigate the links actual destination using the preview feature. -Remove security badge as you enter a restaurant or retail establishment. Under DLA policy, a first-line supervisor may be delegated authority to: Approved telework requests. Spear Phishing attacks commonly attempt to impersonate email from trusted entities. -After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. If your wireless device is improperly configured someone could gain control of the device? The Act requires employees to successfully complete telework training before they can telework. Should you always label your removable media? What action should you take first? **Identity ManagementWhich of the following is the nest description of two-factor authentication? includes a one-time $200 Amazon allowance for ordering at-home office equipment or preferred supplies to support the telework experience. answered May 31, 2022 by Haren (305k points) Best answer. What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure? Digital Nomads: The Final Frontier of Work Arrangements. What information most likely presents a security risk on your personal social networking profile? When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? **Social EngineeringWhat is TRUE of a phishing attack? Be aware of classification markings and all handling caveats. \quad (2) For the fiscal year ended May 31, 2012, determine the amount of the gain or loss that would be recorded due to the change in the Allowance to Reduce Inventory to Market. Employers can hire geographically distributed talent and reduce overhead expenses, while employees can gain flexibility, save time, and reduce transportation and some child-care costs. What is an indication that malicious code is running on your system? weegy. Additionally the National Archives & Records Administration provides guidance to agencies and their employees that applies to Federal records in a telework environment on NARA's FAQs about Telework. a person receives clear information about performance effectiveness from the work itself. As a security best practice, what should you do before exiting? View more. Which of the following is an example of a strong password? *SpillageAfter reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. The Corporate Transparency Act (CTA) was enacted to prevent money laundering and promote a "know your customer" policy by imposing new disclosure requirements on "reporting companies." Computer programmers, travel agents and tech support personnel only need a telephone and a computer with internet access to do . TMOs will often work with a Telework Coordinator on the day-to-day operational aspects of telework. Companies should never just implement telecommuting without changing anything else, says I/O psychologist Kristen Shockley, PhD, an associate professor at the University of Georgia. If you are an annuitant, please contact the Retirement Office during Open Season via one of the following methods: Using Open Season Express by calling 1-800-332-9798. Although telework is only one of the workplace flexibilities highlighted in the memorandum, the focus of these efforts provide additional momentum for building upon the requirements of passage of the Telework Enhancement Act of 2010 (the Act). But a handful of organizations are effectively using research insights to build evidence-based remote work programsand reaping the rewards. What security device is used in email to verify the identity of sender? These requirements constitute the _____. Which of the following is a true statement? New interest in learning a foregin language. 42, No. Media containing Privacy Act information, PII, and PHI is not required to be labeled. . 2, 2017) and other dimensions of the remote work arrangement. Supervisory Position: 1, 2010). A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. C. They support the strategy of corporate social responsibility by reducing an employee's need to commute using a vehicle. It uses a common language that generalizes across jobs to describe the abilities, work styles, work activities, and work context required for various occupations. One can be at the same time appreciative of the need to include what to do under a threat of violence in employee training and viscerally opposed to the kind of active shooter drills that are currently en vogue. Linda encrypts all of the sensitive data on her government-issued mobile devices. *Malicious CodeWhat are some examples of malicious code? **Identity managementWhich is NOT a sufficient way to protect your identity? **Insider ThreatWhat advantages do insider threats have over others that allows them to cause damage to their organizations more easily? Verified answer. Which of the following is NOT a typical result from running malicious code? What should be your response?