CYBER AWARENESS CHALLENGE
EXAM SET GUIDE Q&A
Which of the following is NOT a best practice for protecting your home wireless network
for telework? - ANSWER -Use your router's pre-set SSID and password
Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a
security risk? - ANSWER -Yes, there is a risk that the signal could be intercepted and
altered
How can you prevent viruses and malicious code? - ANSWER -Scan all external files
before uploading to your computer
Which of the following is an example of behavior that you should report? - ANSWER -
Taking sensitive information home for telework without authorization
You receive a text message from a package shipper notifying you that your package
delivery is delayed due to needing updated delivery instructions from you. - ANSWER -
Delete the message
Which of the following is an appropriate use of a DoD PKI token? - ANSWER -Do not
use a token approved for NIPR on SIPR
Which of the following is a best practice when browsing the internet? - ANSWER -Only
accept cookies from reputable, trusted websites
Where are you permitted to use classified data? - ANSWER -Only in areas with security
appropriate to the classification level
Which of the following contributes to your online identity? - ANSWER -All of these
How can you protect your home computer? - ANSWER -Regularly back up your files
Which of the following statements is true of DoD Unclassified data? - ANSWER -It may
require access and distribution controls
Which of the following is NOT a way that malicious code can spread? - ANSWER -
Running a virus scan
What is the goal of an Insider Threat Program? - ANSWER -Deter, detect, and mitigate
How can you protect your home computer? - ANSWER -Turn on the password feature
Carl receives an e-mail about a potential health risk... - ANSWER -Forward it
EXAM SET GUIDE Q&A
Which of the following is NOT a best practice for protecting your home wireless network
for telework? - ANSWER -Use your router's pre-set SSID and password
Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a
security risk? - ANSWER -Yes, there is a risk that the signal could be intercepted and
altered
How can you prevent viruses and malicious code? - ANSWER -Scan all external files
before uploading to your computer
Which of the following is an example of behavior that you should report? - ANSWER -
Taking sensitive information home for telework without authorization
You receive a text message from a package shipper notifying you that your package
delivery is delayed due to needing updated delivery instructions from you. - ANSWER -
Delete the message
Which of the following is an appropriate use of a DoD PKI token? - ANSWER -Do not
use a token approved for NIPR on SIPR
Which of the following is a best practice when browsing the internet? - ANSWER -Only
accept cookies from reputable, trusted websites
Where are you permitted to use classified data? - ANSWER -Only in areas with security
appropriate to the classification level
Which of the following contributes to your online identity? - ANSWER -All of these
How can you protect your home computer? - ANSWER -Regularly back up your files
Which of the following statements is true of DoD Unclassified data? - ANSWER -It may
require access and distribution controls
Which of the following is NOT a way that malicious code can spread? - ANSWER -
Running a virus scan
What is the goal of an Insider Threat Program? - ANSWER -Deter, detect, and mitigate
How can you protect your home computer? - ANSWER -Turn on the password feature
Carl receives an e-mail about a potential health risk... - ANSWER -Forward it