CYBER AWARENESS CHALLENGE-
EXAM GUIDE QUESTIONS AND
ANSWERS
Which of the following is NOT an example of sensitive information? - ANSWER -Press
release data
Is it permitted to share an unclassified draft document with a non-DoD professional
discussion group? - ANSWER -As long as the document is cleared for public release,
you may release it outside of DoD
Which of the following is an example of Protected Health Information (PHI)? - ANSWER
-I've tried all the answers and it still tells me off. Examples are: Patient names, Social
Security numbers, Driver's license numbers, insurance details, and birth dates
Which of the following represents a good physical security practice? - ANSWER -Use
your own security badge, key code, or Common Access Card (CAC)/Personal Identity
Verification (PIC) card.
Which of the following is NOT a good way to protect your identity? - ANSWER -Use a
single, complex password for your system and application logons.
Which of the following statements is TRUE about the use of DoD Public Key
Infrastructure (PKI) tokens? - ANSWER -Always use DoD PKI tokens within their
designated classification level.
Which of the following is NOT a typical means for spreading malicious code? -
ANSWER -Patching from a trusted source
Which of the following is a practice that helps to protect you from identity theft? -
ANSWER -Ordering a credit report annually
Which of the following is a practice that helps to prevent the download of viruses and
other malicious code when checking your email? - ANSWER -Do not access links or
hyperlinked media such as buttons and graphics in email messages.
You receive an unexpected email from a friend: "I think you'll like this:
https://tinyurl.com/2fcbvy." What action should you take? - ANSWER -Use TinyURL's
preview feature to investigate where the link leads.
You receive an email from the Internal Revenue Service (IRS) demanding immediate
payment of back taxes of which you were not aware. The email provides a website and
EXAM GUIDE QUESTIONS AND
ANSWERS
Which of the following is NOT an example of sensitive information? - ANSWER -Press
release data
Is it permitted to share an unclassified draft document with a non-DoD professional
discussion group? - ANSWER -As long as the document is cleared for public release,
you may release it outside of DoD
Which of the following is an example of Protected Health Information (PHI)? - ANSWER
-I've tried all the answers and it still tells me off. Examples are: Patient names, Social
Security numbers, Driver's license numbers, insurance details, and birth dates
Which of the following represents a good physical security practice? - ANSWER -Use
your own security badge, key code, or Common Access Card (CAC)/Personal Identity
Verification (PIC) card.
Which of the following is NOT a good way to protect your identity? - ANSWER -Use a
single, complex password for your system and application logons.
Which of the following statements is TRUE about the use of DoD Public Key
Infrastructure (PKI) tokens? - ANSWER -Always use DoD PKI tokens within their
designated classification level.
Which of the following is NOT a typical means for spreading malicious code? -
ANSWER -Patching from a trusted source
Which of the following is a practice that helps to protect you from identity theft? -
ANSWER -Ordering a credit report annually
Which of the following is a practice that helps to prevent the download of viruses and
other malicious code when checking your email? - ANSWER -Do not access links or
hyperlinked media such as buttons and graphics in email messages.
You receive an unexpected email from a friend: "I think you'll like this:
https://tinyurl.com/2fcbvy." What action should you take? - ANSWER -Use TinyURL's
preview feature to investigate where the link leads.
You receive an email from the Internal Revenue Service (IRS) demanding immediate
payment of back taxes of which you were not aware. The email provides a website and