CYBER AWARENESS EXAM Q&A
Which of these is not a potential indicator that your device may be under malicious code
attack - ANSWER -operating system update
how can you protect your home computer - ANSWER -install spyware protection
software
Which of the following is permitted within a sensitive compartmented information facility
SCIF? - ANSWER -An authorized Government-owned Portable Electronic Device (PED)
Type of data could reasonably be expected to cause damage to national security? -
ANSWER -Top Secret
example of a strong password - ANSWER -bBrobr@791*p
Which of the following is true of working within a sensitive compartmented information
facility SCIF - ANSWER -badges must be worn while in the facility and removed when
leaving the facility
which of the following statements is true of DoD unclassified data? - ANSWER -It does
not have potential to damage national security
as you scroll through your social media feed, a news headline catches your eye. What
should you consider before sharing it - ANSWER -whether source is credible and
reliable
how can you protect yourself from identity theft? - ANSWER -review your credit report
annually
Steve occasionally runs errands during virtual meetings. He joins the meeting using his
approved government device. does this pose a security concern? - ANSWER -yes,
eavesdroppers may be listening to Steve’s conversation
how can you protect your home computer? - ANSWER -use legitimist known antivirus
software
which of the following is not an appropriate use of your cac? - ANSWER -exchanging for
a visitor pass in another building
Which of the following is a best practice when browsing the internet - ANSWER -look for
https in the URL name
Which of the following is an allowed use of government furnished equipment - ANSWER
-emailing your supervisor
Which of these is not a potential indicator that your device may be under malicious code
attack - ANSWER -operating system update
how can you protect your home computer - ANSWER -install spyware protection
software
Which of the following is permitted within a sensitive compartmented information facility
SCIF? - ANSWER -An authorized Government-owned Portable Electronic Device (PED)
Type of data could reasonably be expected to cause damage to national security? -
ANSWER -Top Secret
example of a strong password - ANSWER -bBrobr@791*p
Which of the following is true of working within a sensitive compartmented information
facility SCIF - ANSWER -badges must be worn while in the facility and removed when
leaving the facility
which of the following statements is true of DoD unclassified data? - ANSWER -It does
not have potential to damage national security
as you scroll through your social media feed, a news headline catches your eye. What
should you consider before sharing it - ANSWER -whether source is credible and
reliable
how can you protect yourself from identity theft? - ANSWER -review your credit report
annually
Steve occasionally runs errands during virtual meetings. He joins the meeting using his
approved government device. does this pose a security concern? - ANSWER -yes,
eavesdroppers may be listening to Steve’s conversation
how can you protect your home computer? - ANSWER -use legitimist known antivirus
software
which of the following is not an appropriate use of your cac? - ANSWER -exchanging for
a visitor pass in another building
Which of the following is a best practice when browsing the internet - ANSWER -look for
https in the URL name
Which of the following is an allowed use of government furnished equipment - ANSWER
-emailing your supervisor