What type of attack might this be? *INSIDER THREAT*Based on the description below how many potential insider threat indicators are present? On a NIPRNET system while using it for a PKI-required task. New interest in learning a foreign language. Within a secure area, you see an individual you do not know. A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. Which of the following is an invalid guideline for securing telework computers and laptops , per the National Institute of Standards and Technology ( NIST ) Special Publication ( SP ) 800-114 ? A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. 6, 2017). They support the strategy of corporate social responsibility by reducing an employee's need to commute using a vehicle. Remove your security badge after leaving your controlled area or office building. A man you do not know is trying to look at your Government-issued phone and has asked to use it. JOB KNOWLEDGE: Must have a basic technical understanding of major building mechanical systems and equipment. Advancing psychology to benefit society and improve lives, Center for Advanced Human Resource Studies, Workplace Redesign: Current Trends, Challenges, and Opportunities, Virtual Teams: Conceptualization, Integrative Review and Research Recommendations. When using your home network to telework, an unsecured IoT device could become an attack vector to any attached government-furnished equipment (GFE). **Insider ThreatWhat advantages do insider threats have over others that allows them to cause damage to their organizations more easily? **Identity ManagementYour DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. inputs used in the development of the work unit's product. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. children or elderly relatives. Thats a hard transition for a lot of people to make.. For some, operating from a co-working spacea shared office that provides telecommuters and freelancers with internet access, meeting rooms and other amenitiescan help address social isolation. You are logged on to your unclassified computer and just received an encrypted email from a co-worker. It all depends on the context.. Back to top And you can ask questions on the content site through the word "Ask a question" at the . You have reached the office door to exit your controlled area. They are the most difficult to implement for people in managerial or professional jobs. *USE OF GFE*What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? c. testing whether French teachers merited higher pay. Which of the following best describes job sharing? whether the employee is expected to work during agency closures or other Continuity of Operations (COOP) related emergencies or situations that may result in a disruption to normal office operations). The state may verify the information. Which of the following is NOT an example of sensitive information? Preferred formal educational background in one of the following: Business Administration, Project Management, Information Systems Management, National Security Studies, Computer Science, or . **Social EngineeringWhich of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Store it in a General Services Administration (GSA)-approved vault or container Based on the description that follows, how many potetntial insider threat indicator (s) are displayed? What is the result of an organization structure that is strongly based on function? Of the following, which is NOT a problem or concern of an Internet hoax? What action should you take? which store are the prices based on). 2, 2014), employee engagement (Masuda, A.D., et al., Career Development International, Vol. Which of the following is true about knowledge, skills, abilities, and other characteristics (KSAOs) that are required for a job? Never allow sensitive data on non-Government-issued mobile devices. With regard to COOP, note that Emergency Relocation Group (ERG) members must be prepared to telework at any time. Helen is utilizing a flexible work schedule option known as _____. Geotagging posts using Global Positioning System (GPS) or location links Accepting all information posted by your network as true ~Understanding and using the available privacy settings Connecting with people who share mutual connections with you, even if you don't know them **Social Networking What should you do? What is an indication that malicious code is running on your system? Telework helps make great places In 1964, science fiction writer Arthur C. Clarke predicted that doctors on one continent would one day operate on a patient on another continent, but missed the. What should you do to protect classified data? -Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. Your health insurance explanation of benefits (EOB). Which of the following should you do immediately? TMOs will often work with a Telework Coordinator on the day-to-day operational aspects of telework. In the case of emergency telework, what should I have available at all times at my home office that would enable me to be functional without coming onsite to retrieve materials. Social Security Number; date and place of birth; mothers maiden name. While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. Determine if the software or service is authorized. How many indicators does this employee display? In a 2015 research review, Golden and his colleagues found that, overall, telecommuting increased job satisfaction, performance and feelings of commitment to an organization among employees. *SpillageA user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. What is NOT Personally Identifiable Information (PII)? -Assuming open storage is always authorized in a secure facility, -Telework is only authorized for unclassified and confidential information, -Taking classified documents from your workspace. You are reviewing your employees annual self evaluation. Store it in a shielded sleeve to avoid chip cloning. Which of the following job analysis methods requires subject-matter experts to evaluate a job in terms of abilities required to perform the job? **Classified DataWhat is required for an individual to access classified data? **Social NetworkingWhen is the safest time to post details of your vacation activities on your social networking website? Trust among team members starts lower in virtual teams than in face-to-face teams, but over time, it can build to the same levels, she says. As long as the document is cleared for public release, you may release it outside of DoD. -Make note of any identifying information and the website URL and report it to your security office. For example, the EPA confirmed a year-to-year drop of over 30% in pollution levels in San Francisco following the shelter-in-place order. How many potential insider threat indicators is Bob displaying? . When using your government-issued laptop in public environments, with which of the following should you be concerned? How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Which of the following is an appropriate course of action while formulating job descriptions? Use your own facility access badge or key code. If your wireless device is improperly configured someone could gain control of the device? In the U.S., interest in telework spiked following the events of 9/11 and the anthrax attacks that soon followed, which forced several key government offices to close. 92, No. For telework to function, one must receive permission or access from one's organization. A 2013 Gallup poll found that teleworkers log an extra four hours per week on average compared with their counterparts in the office. Employees whose jobs require concentration or significant problem-solving often need focused time to think deeply about the task at hand, Golden says. How should you securely transport company information on a removable media? What action should you take first? -It must be released to the public immediately. Ask for information about the website, including the URL. d. evaluating the quality of French schools. Which is an untrue statement about unclassified data? In the teleworking sphere, psychologists are confident about a continuing upward trendBell anticipates such growth as businesses aim to attract employees in a tight labor market and as communication technologies become more sophisticatedbut theyre still probing a number of unanswered questions. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. Which of the following should be done to keep your home computer secure? What are some of the potential advantages and disadvantages? Label all files, removable media, and subject headers with appropriate classification markings. Additionally, if you are using assistive technology and would like to be notified of items via alert boxes, please, This website uses features which update page content based on user actions. CUI may be stored on any password-protected system. You receive an unexpected email from a friend: "I think youll like this: (URL)" What action should you take? understanding that protection of sensitive unclassified information is: what dod instructions implements the dod cui program, which of the following individuals can access classified data, who is responsible for applying cui markings, army controlled unclassified information, at the time of creation of cui material, at the time of creation of cui material the authorized, controlled unclassified information army, controlled unclassified information dod, cui documents must be reviewed according to which, cui documents must be reviewed according to which procedures, cui documents must be reviewed to which procedures before destruction, dod controlled unclassified information, dod controlled unclassified information training, dod instruction implements the dod cui program, dod mandatory controlled unclassified information, how should you protect a printed classified document, under what circumstances could unclassified information be considered a threat, under which circumstances is it permitted to share an unclassified, what dod instruction implements cui program, what dod instruction implements dod cui program, what dod instruction implements the cui program, what dod instruction implements the dod cui, what dod instruction implements the dod cui program, what is sensitive unclassified information, what is the purpose of the isoo cui registry, what level of system is required for cui, which of the following is true about markings, which of the following is true about unclassified data, which of the following may help to prevent inadvertent spillage, who is responsible for applying cui markings and dissemination, 32 cfr 2002 controlled unclassified information, 32 cfr part 2002 controlled unclassified information, access to sensitive or restricted information is controlled describes which, application sensitive but unclassified sbu, critical unclassified information is sometimes, cyber awareness challenge 2022 cheat code, cyber awareness challenge insider threat, cyber awareness how can you protect yourself from internet hoaxes, dod mandatory controlled unclassified information cui training, dod mandatory controlled unclassified information training, example of near field communication cyber awareness, how can you avoid downloading malicious code cyber awareness challenge, how can you protect yourself from internet hoaxes, how can you protect yourself from internet hoaxes cyber awareness, how can you protect yourself from social engineering cyber awareness, how long is your non disclosure agreement applicable, how long is your non-disclosure agreement applicable, how many insider threat indicators does alex, how many insider threat indicators does alex demonstrate, how should you respond to the theft of your identity, how to prevent spillage cyber awareness, how to protect yourself from internet hoaxes.