DoD Annual TrainingAnswer Key

2023 Cyber Awareness Knowledge Check

48 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

(Spillage) Which of the following is a good practice to prevent spillage?

ANSWER

Always check to make sure you are using the correct network for the level of data

QUESTION 2

(Spillage) What does "spillage" refer to?

ANSWER

Information improperly moved from a higher protection level to a lower protection level

QUESTION 3

(Spillage) Which of the following may help to prevent spillage?

ANSWER

Follow procedures for transferring data to and from outside agency and non-Government networks

QUESTION 4

(Spillage) A vendor conducting a pilot program with your organization contacts you for organizational data to use in a prototype. How should you respond?

ANSWER

Refer the vendor to the appropriate personnel

QUESTION 5

(Spillage) You receive an inquiry from a reporter about government information not cleared for public release. How should you respond?

ANSWER

Refer to reporter to your organization's public affairs office

QUESTION 6

(Spillage) You find information that you know to be classified on the Internet. What should you do?

ANSWER

Note the website's URL and report the situation to your security point of contact

QUESTION 7

(Classified Data) Who designates whether information is classification level?

ANSWER

Original classification authority

QUESTION 8

(Classified Data) Which of the following must you do before using an unclassified laptop and peripherals in a collateral classified environment?

ANSWER

Ensure that any cameras, microphones, and Wi-Fi embedded in the laptop are physically disabled

QUESTION 9

(Classified Data) Which of the following is a good practice to protect classified information?

ANSWER

Don't assume open storage in a secure facility is authorized

QUESTION 10

(Classified Data) What is the basis for the handling and storage of classified data?

ANSWER

Classification markings and handling caveats

QUESTION 11

(Insider Threat) Based on the description that follows, how many potential insider threat indicator(s) are displayed? A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationship with peers, purchases an unusually expensive new car, and has unexplained absences from work.

ANSWER

3 or more indicators

QUESTION 12

(Insider Threat) Which scenario might indicate a reportable insider threat?

ANSWER

A colleague removes sensitive information without seeking authorization in order to perform authorized telework.

QUESTION 13

(Insider Threat) Which of the following is a reportable insider threat activity?

ANSWER

Attempting to access sensitive information without need-to-know

QUESTION 14

(Insider Threat) Which of the following is a potential insider threat indicator?

ANSWER

Unusual interest in classified information

QUESTION 15

(Insider Threat) What is an insider threat?

ANSWER

Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities.

QUESTION 16

(Social Networking) How can you protect your organization on social networking sites?

ANSWER

Ensure there are no identifiable landmarks visible in any photos taken in a work setting that you post

QUESTION 17

(Social Networking) Which of the following statements is true?

ANSWER

Adversaries exploit social networking sites to disseminate fake news.

QUESTION 18

(Social Networking) When may you be subject to criminal, disciplinary, and/or administrative action due to online harassment, bullying, stalking, hazing, discrimination, or retaliation?

ANSWER

If you participate in or condone it at any time

QUESTION 19

(Controlled Unclassified Information) Which of the following is true of Protected Health Information (PHI)?

ANSWER

It is created or received by a healthcare provider, health plan, or employer.

QUESTION 20

(Controlled Unclassified Information) Which is a best practice for protecting Controlled Unclassified Information (CUI)?

ANSWER

Store it in a locked desk drawer after working hours

QUESTION 21

(Controlled Unclassified Information) Which designation marks information that does not have potential to damage national security?

ANSWER

Unclassified

QUESTION 22

(Controlled Unclassified Information) Which of the following is NOT an example of Personally Identifiable Information (PII)?

ANSWER

High school attended

QUESTION 23

(Controlled Unclassified Information) Which of the following is true of Controlled Unclassified Information (CUI)?

ANSWER

CUI must be handled using safeguarding or dissemination controls.

QUESTION 24

(Controlled Unclassified Information) Which designation includes Personally Identifiable Information (PlI) and Protected Health Information (PHI)?

ANSWER

Controlled Unclassified Information (CUI)

QUESTION 25

(Controlled Unclassified Information) Which of the following is a security best practice for protecting Personally Identifiable Information (PII)?

ANSWER

Only use Government-furnished or Government-approved equipment to process PIl.

QUESTION 26

(Physical Security) Which of the following is a best practice for physical security?

ANSWER

Report suspicious activity

QUESTION 27

(Physical Security) Which of the following best describes good physical security?

ANSWER

Lionel stops an individual in his secure area who is not wearing a badge.

QUESTION 28

(Identity Management) Which of the following is true of using a DoD Public Key Infrastructure (PKI) token?

ANSWER

It should only be in a system while actively using it for a PKI-required task.

QUESTION 29

(Identity Management) Which of the following is true of the Common Access Card (CAC)?

ANSWER

It contains certificates for identification, encryption, and digital signature.

QUESTION 30

(Identity Management) Which of the following is an example of two-factor authentication?

ANSWER

A Common Access Card and Personal Identification Number

QUESTION 31

(Identity Management) What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card?

ANSWER

Store it in a shielded sleeve

QUESTION 32

(Physical Security) Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only?

ANSWER

CPCON 1

QUESTION 33

(Sensitive Compartmented Information) What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)?

ANSWER

Confirm the individual's need-to-know and access

QUESTION 34

(Sensitive Compartmented Information) Which of the following is true of sharing information in a Sensitive Compartmented Information Facility (SCIF)?

ANSWER

Individuals must avoid referencing derivatively classified reports classified higher than the recipient.

QUESTION 35

(Sensitive Compartmented Information) Which of the following is true of Security Classification Guides?

ANSWER

The provide guidance on reasons for and duration of classification of information.

QUESTION 36

(Removable Media in a SCIF) Which of the following is true of portable electronic devices (PEDs) in a Sensitive Compartmented Information Facility (SCIF)?

ANSWER

Only connect government-owned PEDs to the same level classification information system when authorized

QUESTION 37

(Removable Media in SCIF) Which of the following is NOT a potential consequence of using removable media unsafely in a Sensitive Compartmented Information Facility (SCIF)?

ANSWER

Damage to the removable media

QUESTION 38

(Malicious Code) Which of the following is a way to prevent the spread of malicious code?

ANSWER

Scan all external files before uploading to your computer

QUESTION 39

(Malicious Code) Which of the following is NOT a type of malicious code?

ANSWER

Executables

QUESTION 40

(Website Use) Which of the following actions ean help to protect your identity?

ANSWER

Shred personal documents

QUESTION 41

(Social Engineering) What type of social engineering targets senior officials?

ANSWER

Whaling

QUESTION 42

(Social Engineering) Which of the following is true?

ANSWER

Digitally signed e-mails are more secure.

QUESTION 43

(Social Engineering) Which is an appropriate use of govemment e-mail?

ANSWER

Use a digital signature when sending attachments or hyperlinks

QUESTION 44

(Travel) What security risk does a public Wi-Fi connection pose?

ANSWER

It may expose the information sent to theft.

QUESTION 45

(Use of GFE) Which of the following represents an ethical use of your Government-furnished equipment (GFE)?

ANSWER

Checking personal e-mail when allowed by your organization

QUESTION 46

(Mobile Devices) How can you protect data on your mobile computing and portable electronic devices (PEDs)?

ANSWER

Enable automatic screen locking after a pekod of inactivity

QUESTION 47

(Mobile Devices) Which of the following is an example of removable media?

ANSWER

Flash Drive / External hard drive

QUESTION 48

(Home Computer Security) How should you secure your home wireless network for teleworking?

ANSWER

Implement Wi-Fi Protected Access 2 (WPA2) Personal encryption at a minimum

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials