CYBER AWARENESS CHALLENGE
(KNOWLEDGE PRE-CHECK) EXAM
QUESTIONS AND ANSWERS
Which of the following is a best practice for using government e-mail? - ANSWER -Do
not send mass e-mails
How can you mitigate the potential risk associated with a compressed URL (e.g.,
TinyURL, goo.gl)? - ANSWER -Use the preview function to see where the link actually
leads
Where are you permitted to use classified data? - ANSWER -Only in areas with security
appropriate to the classification level
Tom is working on a report that contains employees' names, home addresses, and
salary. Which of the following is Tom prohibited from doing with the report? - ANSWER -
Email it to a colleague like a silly goose
Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a
security risk? - ANSWER -Yes, there is a risk that the signal could be intercepted and
altered
When is the safest time to post on social media about your vacation plans? - ANSWER
-After the trip
Which of the following is permitted when using an unclassified laptop within a collateral
classified space? - ANSWER -A Government-issued wired headset with microphone
Which of the following uses of removable media is allowed? - ANSWER -Government
owned removable media that is approved as operationally necessary
Which of the following is a best practice for managing connection requests on social
networking sites? - ANSWER -Validate connection requests through another source if
possible
which of the following is an authoritative source for derivative classification? - ANSWER
-Security Classification Guide
Which of the following is a step you should NOT take to protect against spillage? -
ANSWER -Purge any device's memory before connecting it to a classified network?
(KNOWLEDGE PRE-CHECK) EXAM
QUESTIONS AND ANSWERS
Which of the following is a best practice for using government e-mail? - ANSWER -Do
not send mass e-mails
How can you mitigate the potential risk associated with a compressed URL (e.g.,
TinyURL, goo.gl)? - ANSWER -Use the preview function to see where the link actually
leads
Where are you permitted to use classified data? - ANSWER -Only in areas with security
appropriate to the classification level
Tom is working on a report that contains employees' names, home addresses, and
salary. Which of the following is Tom prohibited from doing with the report? - ANSWER -
Email it to a colleague like a silly goose
Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a
security risk? - ANSWER -Yes, there is a risk that the signal could be intercepted and
altered
When is the safest time to post on social media about your vacation plans? - ANSWER
-After the trip
Which of the following is permitted when using an unclassified laptop within a collateral
classified space? - ANSWER -A Government-issued wired headset with microphone
Which of the following uses of removable media is allowed? - ANSWER -Government
owned removable media that is approved as operationally necessary
Which of the following is a best practice for managing connection requests on social
networking sites? - ANSWER -Validate connection requests through another source if
possible
which of the following is an authoritative source for derivative classification? - ANSWER
-Security Classification Guide
Which of the following is a step you should NOT take to protect against spillage? -
ANSWER -Purge any device's memory before connecting it to a classified network?