answersLogoWhite

0

What else can I help you with?

Related Questions

Mobile computing device containing PII is lost?

US Computer Emergency Response Team (CERT), Component Privacy Office, and DoD Privacy Office


If your mobile computing device containing PII is lost, you must inform the following agencies within the specified time period except?

The US CERT within 1 hour.b.The US CERT within 12 hours.c.The Component Privacy Office within 24 hours.d.The DoD Privacy Office within 48 hours


When labeling your PDA you should never identify the device as a DoD device?

true


What DOD policy concerns connecting personal mobile devices to organizational networks?

The Department of Defense (DOD) has strict policies regarding the connection of personal mobile devices to organizational networks to mitigate security risks. These concerns primarily revolve around data breaches, unauthorized access, and potential exposure of sensitive information. The DOD emphasizes the use of secure configurations, compliance with cybersecurity standards, and the implementation of mobile device management solutions to ensure that personal devices do not compromise the integrity of the network. Users are typically required to follow specific guidelines and obtain explicit authorization before connecting personal devices to DOD systems.


What DOD Directive establishes policy for the use of commercial wireless device's service's and technologies in the DOD Global Information Grid?

DODD 8100.2 establishes those policies.


Can any unauthorized device that can download or transfer data be connected to a DOD computer?

True


What is considered Classified information by the DoD?

Type your answer here... finance


Which of the following DoD Decision Support Systems is considered DoD's primary resource allocation process?

Planning, Programming, Budgeting, and Execution


The DoD considers a PED to be any portable information system or device that does what?

encrypts information


Is it true that As long as a device is correctly marked it can be connected to a DOD computer?

False


What kind of authentication does DoD require to encrypt sensitive data including PII and PHI on mobile devices and when e-mailed?

The DoD requires you to have a password. This will let you view sensitive data including PII and PHI on mobile devices and e-mails.


Any unauthorized device that can download or transfer data is prohibited from being connected to a DoD computer?

True