Topic Deep DiveAcross 4 CBTs

Identity Management

11 community-sourced questions and answers about Identity Management, aggregated from every CBT we've indexed that covers this topic.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. In which situation below are you permitted to use your PKI token?

ANSWER

Write your password down on a device that only you access (e.g., your smartphone)

QUESTION 2

Which of the following is the nest description of two-factor authentication?

ANSWER

Something you possess, like a CAC, and something you know, like a PIN or password

QUESTION 3

Which is NOT a sufficient way to protect your identity?

ANSWER

Store your Common Access Card (CAC) or Personal Identity Verification (PIV) card in a shielded sleeve ~Write your password down on a device that only you access (e.g., your smartphone) Change your password at least every 3 months Enable two-factor authentication whenever available, even for personal accounts

QUESTION 4

What is the best way to protect your Common Access Card (CAC)?

ANSWER

A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner.

QUESTION 5

Which of the following is NOT a best practice to preserve the authenticity of your identity?

ANSWER

Write your password down on a device that only you access (e.g., your smartphone)

QUESTION 6

Which of the following is an example of two-factor authentication?

ANSWER

A program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control

QUESTION 7

Which of the following is an example of a strong password?

ANSWER

A program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control

QUESTION 8

Which of the following is true of using a DoD Public Key Infrastructure (PKI) token?

ANSWER

A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner.

QUESTION 9

Which of the following is true of the Common Access Card (CAC)?

ANSWER

~All documents should be appropriately marked, regardless of format, sensitivity, or classification. Unclassified documents do not need to be marked as a SCIF. Only paper documents that are in open storage need to be marked.

QUESTION 10

Which of the following is an example of a strong password? -password12345 -%2ZN=Ugq -Fido0823Love -Alabam@1968

ANSWER

%2ZN=Ugq

QUESTION 11

Which of the following is an example of two-factor authentication. -A Common Access Card and Personal Identification Number -Photo identification and proof of residence -Physical access and system access -Facial recognition and a fingerprint

ANSWER

A Common Access Card and Personal Identification Number