Community QuestionSeen on 25 CBTs
Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. In which situation below are you permitted to use your PKI token?
Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
Answer
Write your password down on a device that only you access (e.g., your smartphone)
Alternate answers seen on other CBTs
The same question shows up worded slightly differently across CBT versions. Here are the other answer variants we've indexed.
Use a common password for all your system and application logons.
Army Cyber Awareness Challenge 2023 →On a NIPRNet system while using it for a PKI-required task
Compressed Url Cyber Awareness →Something you possess, like a CAC, and something you know, like a PIN or password
What Guidance Is Available For Marking Sci Cyber Awareness →This question appears on
Army Cyber Awareness Challenge 2023 →Compressed Url Cyber Awareness →Cyber Awareness Cbt Answers →Cyber Awareness What Is Sensitive Compartmented Information →Dod Cyber Awareness 2023 →Good Practice For Telework Cyber Awareness →How Can You Protect Yourself From Internet Hoaxes Cyber Awareness →How Many Potential Insider Threat Indicators Cyber Awareness →How To Prevent Spillage Cyber Awareness →How To Protect Cui Cyber Awareness →I Hate Cbts Cyber Awareness 2023 →Insider Threat Cyber Awareness →Jko Cyber Awareness 2023 →Navy Cyber Awareness Challenge 2023 →Potential Insider Threat Indicators Cyber Awareness →Preventing Spillage Cyber Awareness →Sensitive Compartmented Information Cyber Awareness →Transmitting Sci Cyber Awareness →What Guidance Is Available For Marking Sci Cyber Awareness →What Should The Employee Do Differently Cyber Awareness 2023 →Which Of The Following Is True Cyber Awareness 2023 →Which Of The Following Is True Of Cookies Cyber Awareness →Which Of The Following Is True Of Cui Cyber Awareness →Which Of The Following Statement Is True Cyber Awareness →Which Scenario Might Indicate A Reportable Insider Threat Cyber Awareness →