CYBER AWARENESS KNOWLEDGE
CHECK EXAM QUESTIONS AND
ANSWERS
What are the requirements for access to Sensitive Compartmented Information (SCI)? -
ANSWER -Top Secret clearance and indoctrination into the SCI program
Which of the following is true of removable media and portable electronic devices
(PEDs)? - ANSWER -The risks associated with them may lead to loss of life.
How can you protect your home computer? - ANSWER -Use legitimate, known antivirus
software
How can you protect a mobile device while traveling? - ANSWER -Connect with a
Government VPN
Based on the description provided, how many insider threat indicators are present?
Edward has worked for a DoD agency for 2 years. He is an analyst who takes a great
deal of interest in his work. He occasionally takes a somewhat aggressive interest in
others' work as well, including asking for classified details of their projects. He otherwise
gets along well with his colleagues. - ANSWER -2
Which of the following is an example of a strong password? - ANSWER -bRobr@79l*P
Matt is a government employee who needs to share a document containing source
selection data with his supervisor. Which of the following describes the most appropriate
way for Matt to do this? - ANSWER -Encrypt it and send it via digitally signed
Government e-mail.
You receive a phone call from an unknown person asking for a directory name on your
government furnished laptop so that a software update can be made. Which course of
action should you take? - ANSWER -Document the interaction and contact your security
POC or help desk.
Which of the following is permitted within a Sensitive Compartmented Information
Facility (SCIF)? - ANSWER -A Bluetooth medical device, such as a glucose monitor
When linked to a specific individual, which of the following is NOT an example of
Personally Identifiable Information (PII)? - ANSWER -Smartphone brand and model
Which of the following is an appropriate use of a DoD Public Key Infrastructure (PKI)
token? - ANSWER -Only leave it in a system while actively using it for a PKI-required
task
, Which of the following is a best practice when browsing the internet? - ANSWER -Look
for h-t-t-p-s in the URL name
Which type of data could reasonably be expected to cause damage to national security?
- ANSWER -Confidential
How can you protect data on a mobile device? - ANSWER -Use two-factor
authentication
What is an insider threat? - ANSWER -Someone who uses authorized access, either
wittingly or unwittingly, to harm national security.
Which of the following is an appropriate use of government e-mail? - ANSWER -Using a
digital signature when sending hyperlinks
What is a best practice for creating user accounts for your home computer? - ANSWER
-Create separate accounts for each user and have each user create their own password
Which of the following is NOT an appropriate use of your Common Access Card (CAC)?
- ANSWER -Exchanging it for a visitor pass in another building
Does it pose a security risk to tap your smartwatch to pay for a purchase at a store? -
ANSWER -Yes. There is a risk that the signal could be intercepted and altered.
Which of the following is a potential insider threat indicator? - ANSWER -Death of a
spouse
Which of the following is a best practice for protecting your home wireless network for
telework or remote work? - ANSWER -Implement, as a minimum, Wi-Fi Protected
Access 2 (WPA2) Personal encryption
Which of the following is the safest to share on a social networking site? - ANSWER -
Your favorite movie
How can you protect yourself from identity theft? - ANSWER -Review your credit report
annually
Which of the following is true of working within a Sensitive Compartmented Information
Facility (SCIF)? - ANSWER -Badges must be worn while in the facility and removed
when leaving the facility.
How can you prevent viruses and malicious code? - ANSWER -Scan all e-mail
attachments
CHECK EXAM QUESTIONS AND
ANSWERS
What are the requirements for access to Sensitive Compartmented Information (SCI)? -
ANSWER -Top Secret clearance and indoctrination into the SCI program
Which of the following is true of removable media and portable electronic devices
(PEDs)? - ANSWER -The risks associated with them may lead to loss of life.
How can you protect your home computer? - ANSWER -Use legitimate, known antivirus
software
How can you protect a mobile device while traveling? - ANSWER -Connect with a
Government VPN
Based on the description provided, how many insider threat indicators are present?
Edward has worked for a DoD agency for 2 years. He is an analyst who takes a great
deal of interest in his work. He occasionally takes a somewhat aggressive interest in
others' work as well, including asking for classified details of their projects. He otherwise
gets along well with his colleagues. - ANSWER -2
Which of the following is an example of a strong password? - ANSWER -bRobr@79l*P
Matt is a government employee who needs to share a document containing source
selection data with his supervisor. Which of the following describes the most appropriate
way for Matt to do this? - ANSWER -Encrypt it and send it via digitally signed
Government e-mail.
You receive a phone call from an unknown person asking for a directory name on your
government furnished laptop so that a software update can be made. Which course of
action should you take? - ANSWER -Document the interaction and contact your security
POC or help desk.
Which of the following is permitted within a Sensitive Compartmented Information
Facility (SCIF)? - ANSWER -A Bluetooth medical device, such as a glucose monitor
When linked to a specific individual, which of the following is NOT an example of
Personally Identifiable Information (PII)? - ANSWER -Smartphone brand and model
Which of the following is an appropriate use of a DoD Public Key Infrastructure (PKI)
token? - ANSWER -Only leave it in a system while actively using it for a PKI-required
task
, Which of the following is a best practice when browsing the internet? - ANSWER -Look
for h-t-t-p-s in the URL name
Which type of data could reasonably be expected to cause damage to national security?
- ANSWER -Confidential
How can you protect data on a mobile device? - ANSWER -Use two-factor
authentication
What is an insider threat? - ANSWER -Someone who uses authorized access, either
wittingly or unwittingly, to harm national security.
Which of the following is an appropriate use of government e-mail? - ANSWER -Using a
digital signature when sending hyperlinks
What is a best practice for creating user accounts for your home computer? - ANSWER
-Create separate accounts for each user and have each user create their own password
Which of the following is NOT an appropriate use of your Common Access Card (CAC)?
- ANSWER -Exchanging it for a visitor pass in another building
Does it pose a security risk to tap your smartwatch to pay for a purchase at a store? -
ANSWER -Yes. There is a risk that the signal could be intercepted and altered.
Which of the following is a potential insider threat indicator? - ANSWER -Death of a
spouse
Which of the following is a best practice for protecting your home wireless network for
telework or remote work? - ANSWER -Implement, as a minimum, Wi-Fi Protected
Access 2 (WPA2) Personal encryption
Which of the following is the safest to share on a social networking site? - ANSWER -
Your favorite movie
How can you protect yourself from identity theft? - ANSWER -Review your credit report
annually
Which of the following is true of working within a Sensitive Compartmented Information
Facility (SCIF)? - ANSWER -Badges must be worn while in the facility and removed
when leaving the facility.
How can you prevent viruses and malicious code? - ANSWER -Scan all e-mail
attachments