PM
**"Cyber Awareness 2025: Essential Government Security
Knowledge Check Answers – Stay Compliant & Secure!"**
1. What is the primary benefit of enabling two-factor authentication?
It will show potential hackers that you know what you are doing.
A potential hacker would need both your password and your
mobile phone to login to your accounts.
You'll have peace of mind knowing your accounts are
safer. It will make sure your mobile phone is always near
you.
2. I shall treat any information I acquired about individuals in the course of
my work as strictly:
classified
confidential
for the work
only limited
3. Why is it important to use a digital signature when sending emails
through government channels?
A digital signature is used to encrypt the email content.
A digital signature verifies the sender's identity and ensures
the integrity of the message.
A digital signature is optional for government communications.
A digital signature is only necessary for personal emails.
4. Which type of peripheral is explicitly mentioned as permissible for use
1/56
,2/24/25, 6:01 Government Security
PM
with government furnished equipment (GFE)?
2/56
,2/24/25, 6:01 Government Security
PM
A wired keyboard connected via USB
A wireless mouse A
personal printer
A Bluetooth headset
5. Why is it advised to wait until after a trip to post about work-related travel
on social media?
It helps in gaining more followers.
Posting after the trip reduces the risk of compromising security or
safety.
It allows for better photo editing. It is
a company policy to wait.
6. Describe the role of the original classification authority in the context
of classified information.
The original classification authority manages the storage of classified
documents.
The original classification authority is in charge of reporting security
breaches.
The original classification authority oversees the training of
personnel on data handling.
The original classification authority is responsible for determining
whether information should be classified and at what level.
7. If an employee needs to use an unclassified laptop in a classified area,
what should they ensure regarding their accessories?
They should only use accessories provided by the government.
They can use any personal accessories they prefer.
3/56
, 2/24/25, 6:01 Government Security
PM
They can use accessories that are commonly used in public spaces.
They should use only approved accessories that do not
compromise security.
8. Why is it important to report unsolicited e-mails that contain suspicious links?
Reporting helps prevent potential security breaches and
protects sensitive information.
It ensures that all employees receive the same e-
mails. It helps in identifying the sender's location.
It allows IT to monitor all e-mails received.
9. What is a potential security risk associated with using a smartwatch
for payments?
The payment may take longer to process.
The signal could be intercepted and altered.
The smartwatch may run out of battery.
The smartwatch could be hacked for personal data.
10. If an employee sends an email containing sensitive information without
a digital signature, what potential risk could this pose?
Improved communication efficiency.
Increased risk of unauthorized access to sensitive information.
No risk, as all government emails are secure.
No impact on the integrity of the
information.
11. Why is it important to document interactions with unknown callers
regarding government furnished equipment?
4/56