Cyber Awareness 2025 Knowledge Check Answers
Study online at https://quizlet.com/_g1xmeq
1. Which of the following is an appropriate use of a Only leave it in a system while
DoD Public Key Infrastructure (PKI) token? actively using it for a PKI-re-
quired task
2. Which of the following is a best practice when Look for h-t-t-p-s in the URL
browsing the internet? name
3. Which type of data could reasonably be expected Confidential
to cause damage to national security?
4. How can you protect data on a mobile device? Use two-factor authentication
5. What is an insider threat? Someone who uses authorized
access, either wittingly or unwit-
tingly, to harm national security.
6. Which of the following is an appropriate use of Using a digital signature when
government e-mail? sending hyperlinks
7. What is a best practice for creating user accounts Create separate accounts for
for your home computer? each user and have each user
create their own password
8. Which of the following is NOT an appropriate use Exchanging it for a visitor pass in
of your Common Access Card (CAC)? another building
9. Does it pose a security risk to tap your smartwatch Yes. There is a risk that the sig-
to pay for a purchase at a store? nal could be intercepted and al-
tered.
10. Which of the following is a potential insider threat Death of a spouse
indicator?
11.
1/8
, Cyber Awareness 2025 Knowledge Check Answers
Study online at https://quizlet.com/_g1xmeq
Which of the following is a best practice for pro- Implement, as a minimum,
tecting your home wireless network for telework Wi-Fi Protected Access 2 (WPA2)
or remote work? Personal encryption
12. Which of the following is the safest to share on a Your favorite movie
social networking site?
13. What are the requirements for access to Sensitive Top Secret clearance and indoc-
Compartmented Information (SCI)? trination into the SCI program
14. Which of the following is true of removable media The risks associated with them
and portable electronic devices (PEDs)? may lead to loss of life.
15. How can you protect your home computer? Use legitimate, known antivirus
software
16. How can you protect a mobile device while travel- Connect with a Government VPN
ing?
17. Based on the description provided, how many in- 2
sider threat indicators are present?
Edward has worked for a DoD agency for 2 years.
He is an analyst who takes a great deal of interest
in his work. He occasionally takes a somewhat ag-
gressive interest in others' work as well, including
asking for classified details of their projects. He
otherwise gets along well with his colleagues.
18. Which of the following is an example of a strong bRobr@79l*P
password?
19. Matt is a government employee who needs to Encrypt it and send it via digitally
share a document containing source selection data signed Government e-mail.
with his supervisor. Which of the following de-
2/8
Study online at https://quizlet.com/_g1xmeq
1. Which of the following is an appropriate use of a Only leave it in a system while
DoD Public Key Infrastructure (PKI) token? actively using it for a PKI-re-
quired task
2. Which of the following is a best practice when Look for h-t-t-p-s in the URL
browsing the internet? name
3. Which type of data could reasonably be expected Confidential
to cause damage to national security?
4. How can you protect data on a mobile device? Use two-factor authentication
5. What is an insider threat? Someone who uses authorized
access, either wittingly or unwit-
tingly, to harm national security.
6. Which of the following is an appropriate use of Using a digital signature when
government e-mail? sending hyperlinks
7. What is a best practice for creating user accounts Create separate accounts for
for your home computer? each user and have each user
create their own password
8. Which of the following is NOT an appropriate use Exchanging it for a visitor pass in
of your Common Access Card (CAC)? another building
9. Does it pose a security risk to tap your smartwatch Yes. There is a risk that the sig-
to pay for a purchase at a store? nal could be intercepted and al-
tered.
10. Which of the following is a potential insider threat Death of a spouse
indicator?
11.
1/8
, Cyber Awareness 2025 Knowledge Check Answers
Study online at https://quizlet.com/_g1xmeq
Which of the following is a best practice for pro- Implement, as a minimum,
tecting your home wireless network for telework Wi-Fi Protected Access 2 (WPA2)
or remote work? Personal encryption
12. Which of the following is the safest to share on a Your favorite movie
social networking site?
13. What are the requirements for access to Sensitive Top Secret clearance and indoc-
Compartmented Information (SCI)? trination into the SCI program
14. Which of the following is true of removable media The risks associated with them
and portable electronic devices (PEDs)? may lead to loss of life.
15. How can you protect your home computer? Use legitimate, known antivirus
software
16. How can you protect a mobile device while travel- Connect with a Government VPN
ing?
17. Based on the description provided, how many in- 2
sider threat indicators are present?
Edward has worked for a DoD agency for 2 years.
He is an analyst who takes a great deal of interest
in his work. He occasionally takes a somewhat ag-
gressive interest in others' work as well, including
asking for classified details of their projects. He
otherwise gets along well with his colleagues.
18. Which of the following is an example of a strong bRobr@79l*P
password?
19. Matt is a government employee who needs to Encrypt it and send it via digitally
share a document containing source selection data signed Government e-mail.
with his supervisor. Which of the following de-
2/8