CYBER AWARENESS QUIZ QUESTIONS
WITH COMPLETE ANSWERS
When linked to a specific individual, which of the following is NOT an example of
Personally Identifiable Information (PII)? - ANSWER -Smartphone brand and model
How can you protect yourself on social networking sites? - ANSWER -Validate
connection requests through another source if possible.
Which of the following is true of spillage? - ANSWER -
You receive an e-mail with a link to run an anti-virus scan. Your IT department has not
sent links like this in the past. The e-mail is not digitally signed. What action should you
take? - ANSWER -Report the e-mail to your security POC or help desk.
Which of the following is an allowed use of government furnished equipment (GFE)? -
ANSWER -A wired keyboard connected via USB
Which of the following is a best practice for protecting your home wireless network for
telework or remote work? - ANSWER -Connect to your Government private network
(VPN)
Which of the following is permitted within a Sensitive Compartmented Information
Facility (SCIF)? - ANSWER -An authorized Goverment-owned Portable Electronic
Device (PED)
As you scroll through your social media feed, a news headline catches your eye. What
should you consider before sharing it with your connections? - ANSWER -Whether the
source is credible and reliable.
How can you prevent viruses and malicious code? - ANSWER -Scan all e-mail
attachments
Which of the following is an allowed use of government furnished equipment (GFE)? -
ANSWER -E-mailing your supervisor
John receives an e-mail about a potential shutdown of a major social service unless a
petition receives enough signatures. Which of the following actions should John NOT
take with the e-mail? - ANSWER -Forward it
Which of the following is an appropriate use of government e-mail? - ANSWER -Using a
digital signature when sending hyperlinks.
WITH COMPLETE ANSWERS
When linked to a specific individual, which of the following is NOT an example of
Personally Identifiable Information (PII)? - ANSWER -Smartphone brand and model
How can you protect yourself on social networking sites? - ANSWER -Validate
connection requests through another source if possible.
Which of the following is true of spillage? - ANSWER -
You receive an e-mail with a link to run an anti-virus scan. Your IT department has not
sent links like this in the past. The e-mail is not digitally signed. What action should you
take? - ANSWER -Report the e-mail to your security POC or help desk.
Which of the following is an allowed use of government furnished equipment (GFE)? -
ANSWER -A wired keyboard connected via USB
Which of the following is a best practice for protecting your home wireless network for
telework or remote work? - ANSWER -Connect to your Government private network
(VPN)
Which of the following is permitted within a Sensitive Compartmented Information
Facility (SCIF)? - ANSWER -An authorized Goverment-owned Portable Electronic
Device (PED)
As you scroll through your social media feed, a news headline catches your eye. What
should you consider before sharing it with your connections? - ANSWER -Whether the
source is credible and reliable.
How can you prevent viruses and malicious code? - ANSWER -Scan all e-mail
attachments
Which of the following is an allowed use of government furnished equipment (GFE)? -
ANSWER -E-mailing your supervisor
John receives an e-mail about a potential shutdown of a major social service unless a
petition receives enough signatures. Which of the following actions should John NOT
take with the e-mail? - ANSWER -Forward it
Which of the following is an appropriate use of government e-mail? - ANSWER -Using a
digital signature when sending hyperlinks.