DoD Annual TrainingAnswer Key

Digitally Signed Emails Are More Secure Cyber Awareness

77 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

A vendor conducting a pilot program with your organization contacts you for organizational data to use in a prototype. How should you respond?

ANSWER

Refer the vendor to the appropriate personnel.

QUESTION 2

When classified data is not in use, how can you protect it?

ANSWER

Store classified data appropriately in a GSA-approved vault/container.

QUESTION 3

What is the basis for handling and storage of classified data?

ANSWER

Classification markings and handling caveats.

QUESTION 4

Which of the following must you do before using an unclassified laptop and peripherals in a collateral classified environment?

ANSWER

Ensure that any cameras, microphones, and Wi-Fi embedded in the laptop are physically disabled.

QUESTION 5

What level of damage to national security can you reasonably expect Top secret information to cause if disclosed?

ANSWER

Exceptionally grave damage.

QUESTION 6

Which of the following is true about telework?

ANSWER

You must have your organization's permission to telework.

QUESTION 7

Which of the following is true of protecting classified data?

ANSWER

Classified material must be appropriately marked.

QUESTION 8

Which of the following is a reportable insider threat activity?

ANSWER

Attempting to access sensitive information without need-to-know.

QUESTION 9

Which scenario might indicate a reportable insider threat?

ANSWER

a colleague removes sensitive information without seeking authorization in order to perform authorized telework.

QUESTION 10

Which of the following is a potential insider threat indicator?

ANSWER

1) Unusual interest in classified information. 2) Difficult life circumstances, such as death of spouse.

QUESTION 11

Which piece of information is safest to include on your social media profile?

ANSWER

Only use Government-approved equipment to process PII.

QUESTION 12

Which of the following statements is true?

ANSWER

Many apps and smart devices collect and share your personal information and contribute to your online identity.

QUESTION 13

How can you protect your organization on social networking sites?

ANSWER

Ensure there are no identifiable landmarks visible in any photos taken in a work setting that you post.

QUESTION 14

Which is a best practice for protecting Controlled Unclassified Information (CUI)?

ANSWER

Store it in a locked desk drawer after working hours.

QUESTION 15

Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)?

ANSWER

Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI.

QUESTION 16

Which designation includes Personally Identifiable Information (PII) and Protected Health Information (PHI)?

ANSWER

Controlled Unclassified Information (CUI)

QUESTION 17

Which of the following is NOT an example of CUI?

ANSWER

Press release data.

QUESTION 18

Which of the following is NOT a correct way to protect CUI?

ANSWER

CUI may be stored on any password-protected system.

QUESTION 19

Which of the following best describes good physical security?

ANSWER

Lionel stops an individual in his secure area who is not wearing a badge.

QUESTION 20

Which of the following is an example of two-factor authentication?

ANSWER

A Common Access Card and Personal Identification Number.

QUESTION 21

What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card?

ANSWER

Store it in a shielded sleeve.

QUESTION 22

What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)?

ANSWER

Confirm the individual's need-to-know and access.

QUESTION 23

Which of the following is true of Sensitive Compartmented Information (SCI)?

ANSWER

Access requires Top Secret clearance and indoctrination into the SCI program.

QUESTION 24

Which of the following is NOT a potential consequence of using removable media unsafely in a Sensitive Compartmented Information Facility (SCIF)?

ANSWER

Damage to the removable media.

QUESTION 25

What portable electronic devices (PEDs) are permitted in a SCIF?

ANSWER

Only expressly authorized government-owned PEDs.

QUESTION 26

What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF?

ANSWER

All of these.

QUESTION 27

Which of the following is NOT a type of malicious code?

ANSWER

Executables.

QUESTION 28

Which of the following actions can help tp protect your identity?

ANSWER

Shred personal documents.

QUESTION 29

Which is an appropriate use of government e-mail?

ANSWER

Use a digital signature when sending attachments or hyperlinks.

QUESTION 30

What type of social engineering targets particular groups of people?

ANSWER

Spear phishing.

QUESTION 31

How can you protect yourself from social engineering?

ANSWER

Verify the identity of all individuals.

QUESTION 32

Which of the following is true of traveling overseas with a mobile phone?

ANSWER

A personally owned device approved under Bring Your Own Approved Device (BYOAD) policy must be unenrolled while out of the country.

QUESTION 33

What should Sara do when using publicly available Internet, such as hotel Wi-Fi?

ANSWER

Only connect with Government VPN.

QUESTION 34

What is the danger of using public Wi-Fi connections?

ANSWER

Both of these.

QUESTION 35

Which of the following personally-owned computer peripherals is permitted for use with Government-furnished equipment?

ANSWER

A headset with a microphone through a Universal Serial Bus (USB) port.

QUESTION 36

How can you protect data on your mobile computing and portable electronic devices (PEDs)?

ANSWER

Enable automatic screen locking after a period of inactivity.

QUESTION 37

Which of the following is an example of removable media?

ANSWER

External hard drive.

QUESTION 38

Which of the following is true of Internet of Things (IoT) devices?

ANSWER

They can become an attack vector to other devices on your home network.

QUESTION 39

When is it appropriate to have your security badge visible?

ANSWER

At all times when in the facility.

QUESTION 40

What should the owner of this printed SCI do differently?

ANSWER

Retrieve classified documents promptly from printers.

QUESTION 41

What should the participants in this conversation involving SCI do differently?

ANSWER

Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed.

QUESTION 42

Which of the following demonstrates proper protection of mobile devices?

ANSWER

Linda encrypts all of the sensitive data on her government-issued mobile devices.

QUESTION 43

Which of the following does NOT constitute spillage?

ANSWER

Classified information that should be unclassified and is downgraded.

QUESTION 44

Which of the following is NOT an appropriate way to protect against inadvertent spillage?

ANSWER

Use the classified network for all work, including unclassified work.

QUESTION 45

Which of the following should you NOT do if you find classified information on the internet?

ANSWER

Download the information.

QUESTION 46

Who designates whether information is classified and its classification level?

ANSWER

Follow procedures for transferring data to and from outside agency and non-government networks.

QUESTION 47

Which of the following is a good practice to protect classified information?

ANSWER

Original classification authority.

QUESTION 48

Which of the following may help to prevent spillage?

ANSWER

Avoid talking about work outside of the workplace or with people without a need-to-know.

QUESTION 49

In addition to avoiding the temptation of greed to betray his country, what should Alex do differently?

ANSWER

Report the suspicious behave in accordance with their organization's threat policy.

QUESTION 50

How many insider threat indicators does Alex demonstrate?

ANSWER

Digitally signed e-mails are more secure.

QUESTION 51

What should Alex's colleagues do?

ANSWER

It is often the default but can be prevented by disabling the location function.

QUESTION 52

Which of the following is true?

ANSWER

This is never okay.

QUESTION 53

Which of the following best describes the conditions under which mobile devices and applications can track your location?

ANSWER

Linda encrypts all of the sensitive data on her government-issued mobile devices.

QUESTION 54

When is it okay to charge a personal mobile device using government-furnished equipment (GFE)?

ANSWER

It may prohibit the use of a virtual private network (VPN).

QUESTION 55

What security risk does a public Wi-Fi connection pose?

ANSWER

If you participate in or condone it at any time.

QUESTION 56

Which of the following represents an ethical use of your Government-furnished equipment (GFE)?

ANSWER

Validate friend requests through another source through another source before confirming them.

QUESTION 57

When may you be subject to criminal, disciplinary, and/or administrative action due to online harassment, bullying, stalking, hazing, discrimination, or retaliation?

ANSWER

Photos of your pet.

QUESTION 58

How can you protect yourself on social networking sites?

ANSWER

They have similar features, and the same rules and protections apply to both.

QUESTION 59

Which of the following is true of removable media and portable electronic devices (PEDs)?

ANSWER

CUI must be handled using safeguarding or dissemination controls.

QUESTION 60

Which of the following is a security best practice for protecting Personally Identifiable Information (PII)?

ANSWER

CPCON 1.

QUESTION 61

Which of the following is true of Controlled Unclassified Information (CUI)?

ANSWER

You should remove and take your CAC/PIV card whenever you leave your workstation.

QUESTION 62

Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only?

ANSWER

%2ZN=Ugq

QUESTION 63

Which of the following is true of the Common Access Card (CAC) or Personal Identity Verification (PIV) card?

ANSWER

in any manner.

QUESTION 64

Which of the following is an example of a strong password?

ANSWER

Don't assume open storage in a secure facility is authorized.

QUESTION 65

A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI________.

ANSWER

2 indicators.

QUESTION 66

Which of the following is a good practice to protest classified information?

ANSWER

Adversaries exploit social networking sites to disseminate fake news.

QUESTION 67

Based on the description that follows, how many potential insider threat indicators(s) are displayed? A colleague saves money for an overseas vacation every year, is a single father, and occasionally consumes alcohol.

ANSWER

May be used to mask malicious intent.

QUESTION 68

Which of the following is true about URLs?

ANSWER

1 indicator

QUESTION 69

What does "spillage refer to?

ANSWER

Research the source to evaluate its credibility and reliability.

QUESTION 70

Based on the description that follows, haw many potential insider threat indicator(s) are displayed? a colleague enjoys playing videos games, regularly uses social media, and frequently forgets to secure her smartphone elsewhere before entering areas where it is prohibited.

ANSWER

It contains certificates for identification, encryption, and digital signature.

QUESTION 71

A trusted friend in your social network posts a link to vaccine information on a website unknown to you. What action should you take?

ANSWER

only connect government-owned PEDs to the same level classification information system when authorized.

QUESTION 72

Which of the following is true of the Common Access Card (CAC)?

ANSWER

For Government-owned devices, use approved and authorized applications only.

QUESTION 73

Which of the following is true of portable electronic devices (PEDs) in a Sensitive Compartmented Information Facility (SCIF)?

ANSWER

You should confirm that a site that wants to store a cookie uses an encrypted link.

QUESTION 74

Which of the following is true of downloading apps?

ANSWER

Search for instructions on how to preview where the link actually leads.

QUESTION 75

Which of the following statements is true of cookies?

ANSWER

Avoid inserting removable media with unknown content into your computer.

QUESTION 76

What action should you take with a compressed Uniform Resource Locator (URL) on a website known to you?

ANSWER

Implement Wi-Fi Protected Access 2 (WPA2) Personal encryption at a minimum.

QUESTION 77

Which of the following is a best practice for using removable media?

ANSWER

Whaling

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials