CYBER AWARENESS CHALLENGE
EXAM QUESTIONS AND ANSWERS
Terry sees a post on her social media feed that says there is smoke billowing from the
Pentagon... - ANSWER -This is probably a post designed to attract Terr's attention to
click on a link and steal her information
Which of the following statements about PHI is false? - ANSWER -It is created or
received by a healthcare provider, health plan, or employer of a business associate of
these.
Which of the following is NOT a best practice for protecting your home wireless network
for telework? - ANSWER -Use your router's pre-set SSID and password
Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a
security risk? - ANSWER -Yes, there is a risk that the signal could be intercepted and
altered
How can you prevent viruses and malicious code? - ANSWER -Scan all external files
before uploading to your computer
Which of the following is an example of behavior that you should report? - ANSWER -
Taking sensitive information home for telework without authorization
You receive a text message from a package shipper notifying you that your package
delivery is delayed due to needing updated delivery instructions from you. - ANSWER -
Delete the message
Which of the following is an appropriate use of a DoD PKI token? - ANSWER -Do not
use a token approved for NIPR on SIPR
Which of the following is a best practice when browsing the internet? - ANSWER -Only
accept cookies from reputable, trusted websites
How can you protect your home computer? - ANSWER -Turn on the password feature
Carl receives an e-mail about a potential health risk... - ANSWER -Forward it
Which of the following is an appropriate use of government e-mail? - ANSWER -Using a
digital signature when sending attachments
Sylvia commutes to work via public transportation. She often uses... - ANSWER -Yes.
Eavesdroppers may be listening to Sylvia's phone calls, and shoulder surfers may be
looking at her screen.
EXAM QUESTIONS AND ANSWERS
Terry sees a post on her social media feed that says there is smoke billowing from the
Pentagon... - ANSWER -This is probably a post designed to attract Terr's attention to
click on a link and steal her information
Which of the following statements about PHI is false? - ANSWER -It is created or
received by a healthcare provider, health plan, or employer of a business associate of
these.
Which of the following is NOT a best practice for protecting your home wireless network
for telework? - ANSWER -Use your router's pre-set SSID and password
Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a
security risk? - ANSWER -Yes, there is a risk that the signal could be intercepted and
altered
How can you prevent viruses and malicious code? - ANSWER -Scan all external files
before uploading to your computer
Which of the following is an example of behavior that you should report? - ANSWER -
Taking sensitive information home for telework without authorization
You receive a text message from a package shipper notifying you that your package
delivery is delayed due to needing updated delivery instructions from you. - ANSWER -
Delete the message
Which of the following is an appropriate use of a DoD PKI token? - ANSWER -Do not
use a token approved for NIPR on SIPR
Which of the following is a best practice when browsing the internet? - ANSWER -Only
accept cookies from reputable, trusted websites
How can you protect your home computer? - ANSWER -Turn on the password feature
Carl receives an e-mail about a potential health risk... - ANSWER -Forward it
Which of the following is an appropriate use of government e-mail? - ANSWER -Using a
digital signature when sending attachments
Sylvia commutes to work via public transportation. She often uses... - ANSWER -Yes.
Eavesdroppers may be listening to Sylvia's phone calls, and shoulder surfers may be
looking at her screen.