What certificates does the Common Access Card CAC on Personal Identity Verification PIV card contain?

Scheduled maintenance: Saturday, September 10 from 11PM to 12AM PDT

Home

Subjects

Expert solutions

Create

Log in

Sign up

Upgrade to remove ads

Only ₩37,125/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (26)

After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. You know this project is classified. What should be your response?

Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity.

What is the best response if you find classified government data on the internet?

Note any identifying information, such as the website's URL, and report the situation to your security POC.

What is a good practice to protect classified information?

Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material.

Which classification level is given to information that could reasonably be expected to cause serious damage to national security?

Secret

How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display?

1 indicator

Who might "insiders" be able to cause damage to their organizations more easily than others?

Insiders are given a level of trust and have authorized access to Government information systems.

What type of activity or behavior should be reported as a potential insider threat?

Coworker making consistent statements indicative of hostility or anger toward the United States in its policies.

What information posted publicly on your personal social networking profile represents a security risk?

Your place of birth

When is the best time to post details of your vacation activities on your social networking website?

When your vacation is over, and you have returned home

What is the best example of Personally Identifiable Information (PII)?

Date and place of birth

What is the best example of Protected Health Information (PHI)?

Your health insurance explanation of benefits (EOB)

What does Personally Identifiable Information (PII) include?

Social Security Number; date and place of birth; mother's maiden name

What is a good practice for physical security?

Challenge people without proper badges.

Which is NOT sufficient to protect your identity?

Use a common password for all your system and application logons.

What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card?

Identification, encryption, and digital signature

Which must be approved and signed by a cognizant Original Classification Authority (OCA)?

Security Classification Guide (SCG)

What describes how Sensitive Compartmented Information is marked?

Approved Security Classification Guide (SCG)

Which is a risk associated with removable media?

Spillage of classified information.

What is an indication that malicious code is running on your system?

File corruption

What is a valid response when identity theft occurs?

Report the crime to local law enforcement.

What is whaling?

A type of phishing targeted at high-level personnel such as senior officials.

What is a best practice while traveling with mobile computing devices?

Maintain possession of your laptop and other government-furnished equipment (GFE) at all times.

Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities?

If allowed by organizational policy

Which of the following helps protect data on your personal mobile devices?

Secure personal mobile devices to the same level as Government-issued systems.

What is a best practice to protect data on your mobile computing device?

Lock your device screen when not in use and require a password to reactivate.

What is a possible indication of a malicious code attack in progress?

A pop-up window that flashes and warns that your computer is infected with a virus.

Sets with similar terms

DOD Cyber Awareness Challenge 2019: Knowledge Chec…

69 terms

ewizzy58

DOD Cyber Awareness Challenge 2019

24 terms

Jamie_Lancaster

BIS Test 3

71 terms

PeytonJoe29

Drew Exam 4

50 terms

vy_do58

Sets found in the same folder

USCG OPSEC Test out for Security Fundamentals

17 terms

chuck_wilson89

USCG Sexual Harassment prevention Test Out

15 terms

chuck_wilson89

Cyber Awareness 2020 Knowledge Check

95 terms

Lilwhiteshark97

Cyber Awareness 2020 Knowledge Check

78 terms

Luis_Marino

Other sets by this creator

Educate Quiz

8 terms

haleyfj2000

Mod 7 Participation Quiz - pre test Chp 11 and 14,…

15 terms

haleyfj2000

Mod 6 Participation Quiz - pre test chp 9 and 10;…

20 terms

haleyfj2000

Mod 5 Participation Quiz - pre-test chp 8, 12-13,…

21 terms

haleyfj2000

Verified questions

SOCIOLOGY

The enlightenment was an age of inquiry based on ? Not religion

Verified answer

SOCIOLOGY

Match terms a-e with the numbered example. a. cooperation b. conflict c. social exchange d. coercion e. conformity. Blood donors expect payment.

Verified answer

SOCIOLOGY

Complete the sentence using each term once. a. monogamy b. polyandry c. polygyny d. exogamy e. endogamy f. homogamy g. patrilineal h. blended family i. dual-employed marriage j. boomerang kids. The marriage of one man to one woman is called __________

Verified answer

SOCIOLOGY

Which of the following is not one of the major categories of poor people in United States? a. children under age eighteen b. able-bodied men who refuse to work c. elderly people d. people with disabilities e. females who are single heads of households.

Verified answer

Other Quizlet sets

ENGLISH 12B NEW

194 terms

mtilton21

44. Workplace Safety Review

20 terms

Erin_Campbell614

Chapter 3 review Biology - Doyle

30 terms

Toby_Aranda

Related questions

QUESTION

A device used to steal credit card information by copying the data on the magnetic stripe is called a...

2 answers

QUESTION

BPA Marketing and Public Relations Award

12 answers

QUESTION

What is a Python wrapper for dex converters and Java decompilers?

2 answers

QUESTION

What is the name for an early Mesopotamian wedge-shaped writing using a stylus on clay?

5 answers

What certificates does the Common Access Card CAC or PIV contain?

Depending on the owner, the CAC contains one or three PKI certificates. If the CAC is used for identification purposes only, an ID certificate is all that is needed. However, in order to access a computer, sign a document, or encrypt email, signature and encryption certificates are also required.

What certificates are contained on the DoD Public Key Infrastructure implemented by the CAC PIV card?

DOD PKI client certificates include 1 identity, 1 email signature, and 1 email encryption certificate, and may be obtained from the DoD free of charge.

How should you protect your Common Access Card CAC or Personal Identity Verification PIV card?

To protect the information on your CAC, you should never tell anyone your PIN or write it down where it can be easily found. Your PIN should be kept secure at all times, just like your Social Security Number.

What can help protect the Data on your personal mobile device?

How to Protect Your Mobile Phone Privacy [Calls, SMS & Location....
6 Privacy Tips & Tools for Mobile Devices..
Stick to the App Store..
1.2. Limit What Your Apps Can Access..
1.3. Install A Security App..
1.4. Secure Your Lock Screen..
1.5. Set Up Find My Phone and Remote Wipe..
1.6. ... .
Keep Your Mobile Security & Privacy in Mind..