Answer: Wait until you have access to your government-issued laptop.
Most relevant text from all around the web:
While on vacation a coworker calls and asks you to access a site to review and approve a document that is hosted behind a DoD Public Key Infrastructure (PKI) protected webpage. You do not have your government-issued laptop. What action should you take?
While on vacation a coworker calls and asks you to access a site to review and approve a document that is hosted behind a DoD Public Key Infrastructure ( PKI ) protected webpage . You do not have your government-issued laptop .
A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. What should you do ? Never allow sensitive data on non- Government-issued mobile devices.
How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Store it in a shielded sleeve to avoid chip cloning. Your DoD Common Access Card (CAC) has a Public Key Infrastructure ( PKI ) token approves for access to the NIPRNET.
While you are waiting for your lunch bill a stranger picks up your Government-issued phone from your table and proceeds to exit the facility with it. What should you do ? Try to observe the direction taken and any other useful information and immediately make a report to your security point of contact.
Start studying DOD Cyber Awareness Challenge 2019: Knowledge Check. Learn vocabulary terms and more with flashcards games and other study tools.
Tue Oct 07 2014 · The most important thing...
Disclaimer:
Our tool is still learning and trying its best to find the correct answer to your question. Now its your turn, "The more we share The more we have". Comment any other details to improve the description, we will update answer while you visit us next time...Kindly check our comments section, Sometimes our tool may wrong but not our users.
Are We Wrong To Think We're Right? Then Give Right Answer Below As Comment
No comments:
Post a Comment