Cyber Awareness 2025 Knowledge Check Q & A
How can you protect your home computer? .....ANSWER.....Turn on
the password feature
Carl receives an e-mail about a potential health risk...
.....ANSWER.....Forward it
Which of the following is an appropriate use of government e-
mail? .....ANSWER.....Using a digital signature when sending
attachments
Sylvia commutes to work via public transportation. She often
uses... .....ANSWER.....Yes. Eavesdroppers may be listening to
Sylvia's phone calls, and shoulder surfers may be looking at her
screen.
Which of the following is true of transmitting or transporting SCI?
.....ANSWER.....Printed SCI must be retrieved promptly from the
printer
,Page 2 of 16
What conditions are necessary to be granted access to SCI?
.....ANSWER.....Top Secret clearance and indoctrination into the
SCI program
Terry sees a post on her social media feed that says there is
smoke billowing from the Pentagon... .....ANSWER.....This is
probably a post designed to attract Terr's attention to click on a
link and steal her information
Which of the following statements about PHI is false?
.....ANSWER.....It is created or received by a healthcare provider,
health plan, or employer of a business associate of these.
Which of the following is NOT a best practice for protecting your
home wireless network for telework? .....ANSWER.....Use your
router's pre-set SSID and password
Beth taps her phone at a payment terminal to pay for a
purchase. Does this pose a security risk? .....ANSWER.....Yes, there
is a risk that the signal could be intercepted and altered
, Page 3 of 16
How can you prevent viruses and malicious code?
.....ANSWER.....Scan all external files before uploading to your
computer
Which of the following is an example of behavior that you
should report? .....ANSWER.....Taking sensitive information home
for telework without authorization
You receive a text message from a package shipper notifying
you that your package delivery is delayed due to needing
updated delivery instructions from you. .....ANSWER.....Delete the
message
Which of the following is an appropriate use of a DoD PKI
token? .....ANSWER.....Do not use a token approved for NIPR on
SIPR
Which of the following is a best practice when browsing the
internet? .....ANSWER.....Only accept cookies from reputable,
trusted websites