Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CYBER AWARENESS KNOWLEDGE CHECK EXAM QUESTIONS AND ANSWERS

Beoordeling
-
Verkocht
-
Pagina's
5
Cijfer
A+
Geüpload op
18-01-2026
Geschreven in
2025/2026

CYBER AWARENESS KNOWLEDGE CHECK EXAM QUESTIONS AND ANSWERS

Instelling
DOD Cyber Awareness
Vak
DOD Cyber Awareness

Voorbeeld van de inhoud

CYBER AWARENESS KNOWLEDGE
CHECK EXAM QUESTIONS AND
ANSWERS
What are the requirements for access to Sensitive Compartmented Information (SCI)? -
ANSWER -Top Secret clearance and indoctrination into the SCI program

Which of the following is true of removable media and portable electronic devices
(PEDs)? - ANSWER -The risks associated with them may lead to loss of life.

How can you protect your home computer? - ANSWER -Use legitimate, known antivirus
software

How can you protect a mobile device while traveling? - ANSWER -Connect with a
Government VPN

Based on the description provided, how many insider threat indicators are present?
Edward has worked for a DoD agency for 2 years. He is an analyst who takes a great
deal of interest in his work. He occasionally takes a somewhat aggressive interest in
others' work as well, including asking for classified details of their projects. He otherwise
gets along well with his colleagues. - ANSWER -2

Which of the following is an example of a strong password? - ANSWER -bRobr@79l*P

Matt is a government employee who needs to share a document containing source
selection data with his supervisor. Which of the following describes the most appropriate
way for Matt to do this? - ANSWER -Encrypt it and send it via digitally signed
Government e-mail.

You receive a phone call from an unknown person asking for a directory name on your
government furnished laptop so that a software update can be made. Which course of
action should you take? - ANSWER -Document the interaction and contact your security
POC or help desk.

Which of the following is permitted within a Sensitive Compartmented Information
Facility (SCIF)? - ANSWER -A Bluetooth medical device, such as a glucose monitor

When linked to a specific individual, which of the following is NOT an example of
Personally Identifiable Information (PII)? - ANSWER -Smartphone brand and model

Which of the following is an appropriate use of a DoD Public Key Infrastructure (PKI)
token? - ANSWER -Only leave it in a system while actively using it for a PKI-required
task

, Which of the following is a best practice when browsing the internet? - ANSWER -Look
for h-t-t-p-s in the URL name

Which type of data could reasonably be expected to cause damage to national security?
- ANSWER -Confidential

How can you protect data on a mobile device? - ANSWER -Use two-factor
authentication

What is an insider threat? - ANSWER -Someone who uses authorized access, either
wittingly or unwittingly, to harm national security.

Which of the following is an appropriate use of government e-mail? - ANSWER -Using a
digital signature when sending hyperlinks

What is a best practice for creating user accounts for your home computer? - ANSWER
-Create separate accounts for each user and have each user create their own password

Which of the following is NOT an appropriate use of your Common Access Card (CAC)?
- ANSWER -Exchanging it for a visitor pass in another building

Does it pose a security risk to tap your smartwatch to pay for a purchase at a store? -
ANSWER -Yes. There is a risk that the signal could be intercepted and altered.

Which of the following is a potential insider threat indicator? - ANSWER -Death of a
spouse

Which of the following is a best practice for protecting your home wireless network for
telework or remote work? - ANSWER -Implement, as a minimum, Wi-Fi Protected
Access 2 (WPA2) Personal encryption

Which of the following is the safest to share on a social networking site? - ANSWER -
Your favorite movie

How can you protect yourself from identity theft? - ANSWER -Review your credit report
annually

Which of the following is true of working within a Sensitive Compartmented Information
Facility (SCIF)? - ANSWER -Badges must be worn while in the facility and removed
when leaving the facility.

How can you prevent viruses and malicious code? - ANSWER -Scan all e-mail
attachments

Geschreven voor

Instelling
DOD Cyber Awareness
Vak
DOD Cyber Awareness

Documentinformatie

Geüpload op
18 januari 2026
Aantal pagina's
5
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$15.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
biggdreamer Havard School
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
282
Lid sinds
2 jaar
Aantal volgers
67
Documenten
18355
Laatst verkocht
6 dagen geleden

4.0

45 beoordelingen

5
25
4
7
3
7
2
2
1
4

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen