Scheduled maintenance: Saturday, September 10 from 11PM to 12AM PDT Show
Home Subjects Solutions Create Log in Sign up Upgrade to remove ads Only ₩37,125/year
Terms in this set (17)What should you do if a reporter asks you about potentially classified information on the web? Neither confirm or deny the information is classified. Which of the following may be helpful to prevent inadvertent spillage? Label all files, removable media, and subject headers with appropriate classification markings. What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure? Secret Which of the following is NOT true concerning a computer labeled SECRET? May be used on an unclassified network. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. How many potential insider threat indicators does this employee display? 3 or more indicators Which of the following should be reported as a potential security incident? A coworker removes sensitive information without approval. Which of the following should be reported as a potential security incident (in accordance with your Agency's insider threat policy)? A coworker brings a personal electronic device into prohibited areas. When would be a good time to post your vacation location and dates on your social networking website? When you return from your vacation. In setting up your personal social networking service account, what email address should you use? Your personal email address. Which of the following is NOT a correct way to protect sensitive information?
Sensitive information may be stored on any password-protected system. Which of these is true of unclassified data? It's classification level may rise when aggregated. Is it permitted to share an unclassified draft document with a non-DoD professional discussion group? As long as the document is cleared for public release, you may share it outside of DoD. Within a secure area, you see an individual you do not know. Her badge is not visible to you. What is the best course of action? Ask the individual to identify herself. How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Store it in a shielded sleeve to avoid chip cloning. Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approves for access to the NIPRNET. In which situation below are you permitted to use your PKI token? On a NIPRNET system while using it for a PKI-required task After clicking on a link on a website, a box pops up and asks if you want to run an application. Is it okay to run it? No. Only allow mobile code to run from your organization or your organization's trusted sites. Upon connecting your Government- issued laptop to a public wireless connection, what should you immediately do? Connect to the Government Virtual Private Network (VPN).
Sets with similar termsAnnual DoD Cyber Awareness Challenge Training - 20…35 terms sms8818 DOD Cyber Awareness Challenge 2019: Knowledge Chec…69 terms
ewizzy58 DoD Cyber Awareness 201938 terms wolff4780PLUS Sets found in the same folderDoD Cyber Awareness 201938 terms kyle_terry4 Cyber Awareness 2020 Knowledge Check95 terms Lilwhiteshark97 Cyber Awareness 2020 Knowledge Check78 terms Luis_Marino DOD Cyber Awareness Challenge 2019: Knowledge Check21 terms drm4490 Verified questions
SOCIOLOGY When faced with a friend who is trying to drive under the influence: a. make sure a sober driver follows your friend home b. it's always safe with a bac under .08% c. both a and b d. neither a nor b? Verified answer
SOCIOLOGY Think of an example of real and ideal culture in your school. Should the aspect of ideal culture be abandoned? Why or why not? Verified answer
SOCIOLOGY Match terms a-e with statements. a. population b. representative sample c. random sample d. sample e. survey. All those people with the characteristics the researcher wants to study within the context of a particular research question. Verified answer
SOCIOLOGY If a sociologist wanted to study high school cliques, what would be the best method for collecting data? Support your choice by giving two benefits of using this method. Verified answer Other Quizlet setsBIOD 103 Medical Terminology Quiz 220 terms huMan89 Transformations CAE/CPE (Part 8)56 terms Elena_borisova11 Auditing ch 5 textbook26 terms Tina_Nguyen8631 Super Hot Raven55 terms carverli Related questionsQUESTION Your anti-virus software has detected malware on your system. However, the anti-virus software is unable to remove it, and when you try to delete the files, you can'y because they are in use. What should you try first? 15 answers QUESTION In the mid-1990s, the Internet, long available to researchers, became generally available to the public. 15 answers QUESTION What are the 3 types of play? 15 answers QUESTION Which statement best describes the difference between social media providers and social media sponsors? 2 answers In what situation are you permitted to use your PKI token?In which situation below are you permitted to use your PKI token? On a PIPRNet system while using it for a PKI-required task.
What certificates are contained on the DoD Public Key Infrastructure?The certificates contain Name, Business email address and the DOD ID number of the individual. The DOD PKI system creates and manages digital certificates for the use of Public Key Encryption. These certificates are used for email encryption as well as identification and authorization activities throughout the DOD.
How should you protect your Common Access Card CAC or Personal Identity Verification PIV card?To protect the information on your CAC, you should never tell anyone your PIN or write it down where it can be easily found. Your PIN should be kept secure at all times, just like your Social Security Number.
What certificates does the Common Access Card contain?Card Body Information. Public Key Infrastructure (PKI) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections.. Two digital fingerprints.. Digital photo.. Personal Identity Verification (PIV) certificate.. Organizational affiliation.. Agency.. |