DOD CYBER AWARENESS TEST
REVIEW QUESTIONS AND ANSWERS
Which of the following is the best example of Personally Identifiable Information (PPI)? -
ANSWER -Date of Birth
Which of the following is NOT an example of sensitive information? - ANSWER -Press
release date
Which of the following represents a good physical security practice? - ANSWER -Use
your own security badge, key code, or Common Access Card (CAC)/Personal Identity
Verification (PIV) card.
Which of the following statements is TRUE about the use of DoD Public Key
Infrastructure (PKI) tokens? - ANSWER -Always use DoD PKI tokens within their
designated classification level.
Which of the following is NOT a good way to protect your identity? - ANSWER -Use a
single, complex password for your system and application logons.
After clicking on a link on a website, a box pops up and asks if you want to run an
application. Is it okay to run it? - ANSWER -No. Only allow mobile code to run from
organization or your organization's trusted sites.
While you are registering for a conference, you arrive at the website
http://www.dcsecurityconference.org/registration/. The website requires a credit card for
registration. What should you do? - ANSWER -Since the URL does not start with
"https," do not provide your credit card information.
You receive a call from someone from the help desk who needs your assistance with a
problem on your computer. How should you respond? - ANSWER -Immediately end the
phone call.
Which of the following is NOT true of traveling overseas with a mobile phone? -
ANSWER -Physical security of mobile phones carried overseas is not a major issue.
What do you do if a spillage occurs? - ANSWER -Immediately notify your security point
of contact.
What should you do if a reporter asks you about potentially classified information on the
web? - ANSWER -Neither confirm nor deny the information is classified.
Which of the following is NOT true concerning a computer labeled SECRET? -
ANSWER -May be used on an unclassified network.
REVIEW QUESTIONS AND ANSWERS
Which of the following is the best example of Personally Identifiable Information (PPI)? -
ANSWER -Date of Birth
Which of the following is NOT an example of sensitive information? - ANSWER -Press
release date
Which of the following represents a good physical security practice? - ANSWER -Use
your own security badge, key code, or Common Access Card (CAC)/Personal Identity
Verification (PIV) card.
Which of the following statements is TRUE about the use of DoD Public Key
Infrastructure (PKI) tokens? - ANSWER -Always use DoD PKI tokens within their
designated classification level.
Which of the following is NOT a good way to protect your identity? - ANSWER -Use a
single, complex password for your system and application logons.
After clicking on a link on a website, a box pops up and asks if you want to run an
application. Is it okay to run it? - ANSWER -No. Only allow mobile code to run from
organization or your organization's trusted sites.
While you are registering for a conference, you arrive at the website
http://www.dcsecurityconference.org/registration/. The website requires a credit card for
registration. What should you do? - ANSWER -Since the URL does not start with
"https," do not provide your credit card information.
You receive a call from someone from the help desk who needs your assistance with a
problem on your computer. How should you respond? - ANSWER -Immediately end the
phone call.
Which of the following is NOT true of traveling overseas with a mobile phone? -
ANSWER -Physical security of mobile phones carried overseas is not a major issue.
What do you do if a spillage occurs? - ANSWER -Immediately notify your security point
of contact.
What should you do if a reporter asks you about potentially classified information on the
web? - ANSWER -Neither confirm nor deny the information is classified.
Which of the following is NOT true concerning a computer labeled SECRET? -
ANSWER -May be used on an unclassified network.