answersLogoWhite

0


Best Answer

Laptop

User Avatar

Wiki User

10y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is considered a mobile computing device by the DoD?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Mobile computing device containing PII is lost?

US Computer Emergency Response Team (CERT), Component Privacy Office, and DoD Privacy Office


If your mobile computing device containing PII is lost, you must inform the following agencies within the specified time period except?

The US CERT within 1 hour.b.The US CERT within 12 hours.c.The Component Privacy Office within 24 hours.d.The DoD Privacy Office within 48 hours


When labeling your PDA you should never identify the device as a DoD device?

true


What DOD Directive establishes policy for the use of commercial wireless device's service's and technologies in the DOD Global Information Grid?

DODD 8100.2 establishes those policies.


Can any unauthorized device that can download or transfer data be connected to a DOD computer?

True


What is considered Classified information by the DoD?

Type your answer here... finance


Which of the following DoD Decision Support Systems is considered DoD's primary resource allocation process?

Planning, Programming, Budgeting, and Execution


The DoD considers a PED to be any portable information system or device that does what?

encrypts information


Is it true that As long as a device is correctly marked it can be connected to a DOD computer?

False


What kind of authentication does DoD require to encrypt sensitive data including PII and PHI on mobile devices and when e-mailed?

The DoD requires you to have a password. This will let you view sensitive data including PII and PHI on mobile devices and e-mails.


Any unauthorized device that can download or transfer data is prohibited from being connected to a DoD computer?

True


Which of the following must be considered in a formal risk assessment of DoD web server environment?

The Value of the information Measures to counter threats to the DOD web server environment The threat to the DOD web server environment