click below
click below
Normal Size Small Size show me how
Admin Journeyman
Module 2- Office Management
Question | Answer |
---|---|
(T/F) To turn on track changes you will need to access the design tab. | FALSE |
(T/F) If there are multiple authors, changes are indicated in different colors. | True |
(T/F) Once editing is complete, the final reviewer has the option to accept or reject changes. | True |
(T/F) Selecting "no markup" hides markup, and shows the original document without incorporated changes. | FALSE |
(T/F) Simple Markup points out where changes are made with a red line in margin. | True |
PART 1: Steps for Creating a Ready to Send (RTS) email: | 1) Open MS Outlook. 2) Create new message (New Email). 3) Draft official email using references. 4) Select file "save as" (use outlook message format). |
PART 2: Steps for Creating a Ready to Send (RTS) email: | 5) Select location on computer to save message. 6) Open new Outlook message. 7) Attached saved RTS. 8) Provide BLUF statement. 9) Send RTS email to reviewer/final sender. |
(T/F) A professional email should be focused, organized, clear, understandable, and supported. | True |
(T/F) Email may have started as an informal communication technique, but today it covers the spectrum from personal to professional. | True |
(T/F) The same care and attention to detail should be taken with professional email as with "paper copy" correspondence | True |
PART A: Creating a task in MS Outlook STEPS--> | 1. Clicking Task> New Task or press Ctrl+ Shift+ K 2. In the suggest box, type name for the task. If you've got a lot to enter, keep the subject short, and then add the details in the task body. |
PART B: Creating a task in MS Outlook STEPS --> | 3. If there's a fixed start or end date, set the start date or due date. 4. Set the task's priority by using Priority. 5. If you want a pop-up reminder, check Reminder, and set the date and time. 6. Click task>save and close. |
A web-based solution, built on Microsoft's Customer Relationship Management (CRM) and SharePoint software platforms. | Air Force Enterprise Task Management Tool |
____ in Outlook are items you create that you want to TRACK until it is complete. | Tasks |
(T/F) When you create suspense, they should be realistic and attainable. | True |
____ is defined as information which can be used to distinguish or TRACE an individual's IDENTITY alone. | Personally Identifiable Information (PII) |
It is the responsibility of the ____ to conduct customer counseling for all newly assigned personnel concerning the Privacy Act/FOUO. | Unit Privacy Act Monitor |
(T/F) Marking info FOUO automatically qualifies information for exemption from public release pursuant to the FOIA. | FALSE |
(T/F) For paper records, disposal methods, such as tearing, burning, melting, chemical decomposition, pulping, pulverizing or mutilation are acceptable. | True |
(T/F) For ELECTRIC RECORDS and media, disposable methods such as overwriting, degausses, and sanding are acceptable. | True |
(T/F) Safeguards should be tailored to the type of records in the system, the sensitivity of the personal information stored, the storage medium used, and, to a degree, the number of records maintained. | True |
(T/F) In order to encrypt an email using PKI, you're required a CAC, a reader, etc. | True |
A ___ is the PERSON who request, issues, and manages the Encryption Certificate. | Sponsor |
The ____ is the person whose name appears in Directory Services as the Manager of Organizational Boxes. | Organizational Mailbox Manager |
4 Encryption Steps | 1- In MS Outlook, click> New Email to open a new message window. 2- Compose and address the email message as usual. 3- Click> Options tab on the message toolbar (Encrypt). 4- Once you complete all actions above, message is ready. CLICK SEND. |
The process to Target Data on media infeasible for a given level of effort. | Sanitizing |
To sanitize unclassified media (hard or electronic), the following (three) methods can be used. | Purge Destroy Clear |
Privacy Act Customer Counseling | a) How to report a PII Breach b) How PII is collected c) Disposing of PII d) PII Breach defined e) PII defined f) Review Responsibilities g) How PII should be protected |
Which AFI covers Air Force Privacy and Civil Liberties? | AFI 33-332 |
3 Types of Safeguards | -Administrative -Physical -Technical |