Identity Management
11 community-sourced questions and answers about Identity Management, aggregated from every CBT we've indexed that covers this topic.
Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. In which situation below are you permitted to use your PKI token?
Write your password down on a device that only you access (e.g., your smartphone)
Which of the following is the nest description of two-factor authentication?
Something you possess, like a CAC, and something you know, like a PIN or password
Which is NOT a sufficient way to protect your identity?
Store your Common Access Card (CAC) or Personal Identity Verification (PIV) card in a shielded sleeve ~Write your password down on a device that only you access (e.g., your smartphone) Change your password at least every 3 months Enable two-factor authentication whenever available, even for personal accounts
What is the best way to protect your Common Access Card (CAC)?
A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner.
Which of the following is NOT a best practice to preserve the authenticity of your identity?
Write your password down on a device that only you access (e.g., your smartphone)
Which of the following is an example of two-factor authentication?
A program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control
Which of the following is an example of a strong password?
A program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control
Which of the following is true of using a DoD Public Key Infrastructure (PKI) token?
A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner.
Which of the following is true of the Common Access Card (CAC)?
~All documents should be appropriately marked, regardless of format, sensitivity, or classification. Unclassified documents do not need to be marked as a SCIF. Only paper documents that are in open storage need to be marked.
Which of the following is an example of a strong password? -password12345 -%2ZN=Ugq -Fido0823Love -Alabam@1968
%2ZN=Ugq
Which of the following is an example of two-factor authentication. -A Common Access Card and Personal Identification Number -Photo identification and proof of residence -Physical access and system access -Facial recognition and a fingerprint
A Common Access Card and Personal Identification Number