Your DoD Common Access Card has a Public Key Infrastructure token approved for access to the NIPRNET

Scheduled maintenance: Saturday, September 10 from 11PM to 12AM PDT

Home

Subjects

Solutions

Create

Log in

Sign up

Upgrade to remove ads

Only ₩37,125/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (17)

What should you do if a reporter asks you about potentially classified information on the web?

Neither confirm or deny the information is classified.

Which of the following may be helpful to prevent inadvertent spillage?

Label all files, removable media, and subject headers with appropriate classification markings.

What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure?

Secret

Which of the following is NOT true concerning a computer labeled SECRET?

May be used on an unclassified network.

A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. How many potential insider threat indicators does this employee display?

3 or more indicators

Which of the following should be reported as a potential security incident?

A coworker removes sensitive information without approval.

Which of the following should be reported as a potential security incident (in accordance with your Agency's insider threat policy)?

A coworker brings a personal electronic device into prohibited areas.

When would be a good time to post your vacation location and dates on your social networking website?

When you return from your vacation.

In setting up your personal social networking service account, what email address should you use?

Your personal email address.

Which of the following is NOT a correct way to protect sensitive information?

Sensitive information may be stored on any password-protected system.

Which of these is true of unclassified data?

It's classification level may rise when aggregated.

Is it permitted to share an unclassified draft document with a non-DoD professional discussion group?

As long as the document is cleared for public release, you may share it outside of DoD.

Within a secure area, you see an individual you do not know. Her badge is not visible to you. What is the best course of action?

Ask the individual to identify herself.

How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card?

Store it in a shielded sleeve to avoid chip cloning.

Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approves for access to the NIPRNET. In which situation below are you permitted to use your PKI token?

On a NIPRNET system while using it for a PKI-required task

After clicking on a link on a website, a box pops up and asks if you want to run an application. Is it okay to run it?

No. Only allow mobile code to run from your organization or your organization's trusted sites.

Upon connecting your Government- issued laptop to a public wireless connection, what should you immediately do?

Connect to the Government Virtual Private Network (VPN).

Sets with similar terms

Annual DoD Cyber Awareness Challenge Training - 20…

35 terms

sms8818

DOD Cyber Awareness Challenge 2019: Knowledge Chec…

69 terms

ewizzy58

DoD Cyber Awareness 2019

38 terms

wolff4780PLUS

Sets found in the same folder

DoD Cyber Awareness 2019

38 terms

kyle_terry4

Cyber Awareness 2020 Knowledge Check

95 terms

Lilwhiteshark97

Cyber Awareness 2020 Knowledge Check

78 terms

Luis_Marino

DOD Cyber Awareness Challenge 2019: Knowledge Check

21 terms

drm4490

Verified questions

SOCIOLOGY

When faced with a friend who is trying to drive under the influence: a. make sure a sober driver follows your friend home b. it's always safe with a bac under .08% c. both a and b d. neither a nor b?

Verified answer

SOCIOLOGY

Think of an example of real and ideal culture in your school. Should the aspect of ideal culture be abandoned? Why or why not?

Verified answer

SOCIOLOGY

Match terms a-e with statements. a. population b. representative sample c. random sample d. sample e. survey. All those people with the characteristics the researcher wants to study within the context of a particular research question.

Verified answer

SOCIOLOGY

If a sociologist wanted to study high school cliques, what would be the best method for collecting data? Support your choice by giving two benefits of using this method.

Verified answer

Other Quizlet sets

BIOD 103 Medical Terminology Quiz 2

20 terms

huMan89

Transformations CAE/CPE (Part 8)

56 terms

Elena_borisova11

Auditing ch 5 textbook

26 terms

Tina_Nguyen8631

Super Hot Raven

55 terms

carverli

Related questions

QUESTION

Your anti-virus software has detected malware on your system. However, the anti-virus software is unable to remove it, and when you try to delete the files, you can'y because they are in use. What should you try first?

15 answers

QUESTION

In the mid-1990s, the Internet, long available to researchers, became generally available to the public.

15 answers

QUESTION

What are the 3 types of play?

15 answers

QUESTION

Which statement best describes the difference between social media providers and social media sponsors?

2 answers

In what situation are you permitted to use your PKI token?

In which situation below are you permitted to use your PKI token? On a PIPRNet system while using it for a PKI-required task.

What certificates are contained on the DoD Public Key Infrastructure?

The certificates contain Name, Business email address and the DOD ID number of the individual. The DOD PKI system creates and manages digital certificates for the use of Public Key Encryption. These certificates are used for email encryption as well as identification and authorization activities throughout the DOD.

How should you protect your Common Access Card CAC or Personal Identity Verification PIV card?

To protect the information on your CAC, you should never tell anyone your PIN or write it down where it can be easily found. Your PIN should be kept secure at all times, just like your Social Security Number.

What certificates does the Common Access Card contain?

Card Body Information.
Public Key Infrastructure (PKI) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections..
Two digital fingerprints..
Digital photo..
Personal Identity Verification (PIV) certificate..
Organizational affiliation..
Agency..