How should you protect your Common Access Card CAC or Personal Identity Verification PIV card?

Scheduled maintenance: Saturday, September 10 from 11PM to 12AM PDT

Home

Subjects

Expert solutions

Create

Log in

Sign up

Upgrade to remove ads

Only ₩37,125/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (24)

Which of these is true of unclassified data?

-It must be released to the public immediately.

-Its classification level may rise when aggregated. (Correct)

-It does not affect the safety of Government missions.

-It never requires classification markings.

Which type of information includes personal, payroll, medical, and operational information?

Sensitive

Which of the following is NOT a correct way to protect sensitive information?

Sensitive information may be stored on any password-protected system.

Which of the following is NOT a typical result from running malicious code?

Disabling cookies

What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred?

Exceptionally grave damage

Which of the following is true about telework?

You must have your organization's permission to telework.

Which of following is true of protecting classified data?

Classified material must be appropriately marked.

Which of the following is NOT considered a potential insider threat indicator?

New interest in learning another language?

A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. How many indicators does this employee display?

3 or more?

Which of the following is NOT considered a potential insider threat indicator?

Treated mental health issues.

What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited?

Decline the request.

What information most likely presents a security risk on your personal social networking profile?

Birthplace

You have reached the office door to exit your controlled area. As a security best practice, what should you do before exiting?

Remove your security badge, common access card (CAC), or personal identity verification (PIV) card.

How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card?

Store it in a shielded sleeve to avoid chip cloning.

Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens?

Always use DoD PKI tokens within their designated classification level.

Which of the following is a best practice for handling cookies?

If possible, set your browser preferences to prompt you each time a website wants to store a cookie.

You receive an unexpected email from a friend: "I think you'll like this: (URL)" What action should you take?

Use TinyURL's preview feature to investigate where the link leads.

You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. What action should you take first?

Look for a digital signature on the email.

What is TRUE of a phishing attack?

Phishing can be an email with a hyperlink as bait.

Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?

Connect to the Government Virtual Private Network (VPN).??

A coworker has asked if you want to download a programmer's game to play at work. What should be your response?

I'll pass.

A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. What should you do?

Never allow sensitive data on non-Government-issued mobile devices.

Which of the following demonstrates proper protection of mobile devices?

Linda encrypts all of the sensitive data on her government-issued mobile devices.

How can you protect your information when using wireless technology?

Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals.

Sets with similar terms

DOD Cyber Awareness Challenge 2019: Knowledge Chec…

69 terms

ewizzy58

DOD Cyber Awareness Challenge 2019: Knowledge Check

24 terms

smmgrl

DoD Cyber Awareness 2019

38 terms

wolff4780PLUS

Sets found in the same folder

Annual DoD Cyber Awareness Challenge Training - 20…

35 terms

sms8818

DOD Cyber Awareness Challenge 2019: Knowledge Check

21 terms

drm4490

Cyber Awareness 2020 Knowledge Check

95 terms

Lilwhiteshark97

DoD Cyber Awareness 2019

38 terms

kyle_terry4

Other sets by this creator

Connect Practice Quiz 15

17 terms

Jamie_Lancaster

Connect Practice Quiz 14

22 terms

Jamie_Lancaster

Autonomic NS online Quiz

15 terms

Jamie_Lancaster

Brain Quiz

15 terms

Jamie_Lancaster

Verified questions

SOCIOLOGY

State whether each of the following is or is not a major feature of a postindustrial society. a. emphasis on technical knowledge b. employment of the majority of the labor force in service industries c. reliance on advanced technology d. increased dependence on skilled blue-collar workers e. shift toward the employment of white-collar workers.

Verified answer

SOCIOLOGY

According to the functionalist perspective, what was the main result of the division of labor?

Verified answer

SOCIOLOGY

Which of the following is an example of a reformative social movement? a. the French Revolution b. Zero Population Growth (Population Connection) c. the Branch Davidians d. Woman’s Christian Temperance Union

Verified answer

SOCIOLOGY

Declaring war and coining money are considered states’ rights. implied powers. national rights. expressed powers.

Verified answer

Other Quizlet sets

cis exam 3

40 terms

urnotasa1

106

30 terms

nina_penny

BIS Exam Final Chapter 11 MC

32 terms

akinda1625

BCIS ex 3 ch 9

16 terms

Rose_Barrentine

Related questions

QUESTION

A hand geometry system measures the size and shape of a person's hand.

15 answers

QUESTION

What Intrusion Detection System (IDS) is most likely to affect the performance of individual machines?

2 answers

QUESTION

is command line utility is used to take a backup of the database.

2 answers

QUESTION

CCP 13.29 Fraudulent Use of Possession of Identifying Information

4 answers

What is the best way to protect your Common Access Card CAC or personal?

To protect the information on your CAC, you should never tell anyone your PIN or write it down where it can be easily found. Your PIN should be kept secure at all times, just like your Social Security Number.

What certificates does the Common Access Card CAC on Personal Identity Verification PIV card contain?

Depending on the owner, the CAC contains one or three PKI certificates. If the CAC is used for identification purposes only, an ID certificate is all that is needed. However, in order to access a computer, sign a document, or encrypt email, signature and encryption certificates are also required.

What certificates are contained on the DoD Public Key Infrastructure implemented by the CAC PIV card?

DOD PKI client certificates include 1 identity, 1 email signature, and 1 email encryption certificate, and may be obtained from the DoD free of charge.

What certificates are contained on the Common Access Card CAC )?

Card Body Information.
Public Key Infrastructure (PKI) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections..
Two digital fingerprints..
Digital photo..
Personal Identity Verification (PIV) certificate..
Organizational affiliation..
Agency..

Toplist

Neuester Beitrag

Stichworte