DoD Annual TrainingAnswer Key

Eiv Cyber Awareness Challenge 2023

29 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Spillage: how should uou respond if you receive an inquiry for info not clear for public release?

ANSWER

Refer your order to PAO.

QUESTION 2

Spillage: what will help prevent spillage?

ANSWER

Follow procedures for transfering data to and from outside agency and networks.

QUESTION 3

Classified data: what is the basis for handling classified data?

ANSWER

Classification level and handling caveats

QUESTION 4

Classified data: who designates classified data?

ANSWER

Original Classification Authority

QUESTION 5

Insider Threat: which is the following of a potential insider threat?

ANSWER

Difficult life circumstances

QUESTION 6

Insider threat: what function do insider threat programs aim to fulfill?

ANSWER

Proactively identify future threats and formulate wholistic mitigation responses

QUESTION 7

Insider threats: what is a reportable insider threat?

ANSWER

A colleague removes sensitive info w/o seeking authorization in order to perform authorized telework

QUESTION 8

Social Networking: when might you be subject to criminal, disciplinary, or administrative action due to online harassment, bullying, stalking, etc?

ANSWER

If you participate/condone it in anyway

QUESTION 9

Social Networking: which of the following is a security best practice when using social networking sites?

ANSWER

Avoid posting pii (mothers maiden name)

QUESTION 10

Social Networking: Protect yourself on social networking sites?

ANSWER

Delete posts containing Personal information on a regular basis

QUESTION 11

Controlled Unclass Info: which Desi marks information that does not have the potential to damage national security

ANSWER

Unclassified

QUESTION 12

Controlled Unclass Info: What's true for CUI?

ANSWER

CUI must have diseminating controls

QUESTION 13

Controlled Unclass Info: best way to transmit CUI?

ANSWER

Make sure recipients are clear and need to know then send via encrypted email

QUESTION 14

Physical security: which CPCON establishes a protection policy focus critical functions only

ANSWER

CPCON 1

QUESTION 15

Identity Management: strong password?

ANSWER

@rF+13gtK5!

QUESTION 16

Identify Management: whats true about CACs?

ANSWER

It contains certificates for ID, encryption, and digital signature

QUESTION 17

SCI: what's true of sharing info in a SCIF?

ANSWER

Avoid referencing derivitavely classified reports classified higher than the recipient

QUESTION 18

SCI: what's true for transmitting SCI?

ANSWER

Only transmit SCI if you're courier briefed for SCI

QUESTION 19

Removable media in SCIF: what's true of PEDs in a SCIF?

ANSWER

Only connect government-owned PEDs to the same level classification information system when authorized

QUESTION 20

Malicious Code: what's true for downloading apps?

ANSWER

For government devices, use approved and authorized apps only

QUESTION 21

Website use: how should you respond to theft of identity?

ANSWER

Contact reporting agencies, financial institutions, monitor credit card statements and report crime to law enforcement

QUESTION 22

Social engineering: how to protect from social engineering?

ANSWER

Verify identity of individuals

QUESTION 23

Social engineering: common indicator of phishng attempt?

ANSWER

Claim that you update or validate information

QUESTION 24

Social engineering: what security issue is associated with compressed URLs?

ANSWER

Can be used to mask malicious intent

QUESTION 25

Travel: problems w/ public wifi?

ANSWER

May expose information sent to theft

QUESTION 26

GFE: what is personally owned monitor you shouldn't connect to your GFE?

ANSWER

USB

QUESTION 27

Mobile Devices: which is a best practice for using removable media?

ANSWER

Avoid inserting removable media with unknown content into your computer

QUESTION 28

Mobile devices: how can you protect data on your mobile computing and portable e-devices (PEDs)?

ANSWER

Auto screen locking

QUESTION 29

Home Computer: best practice for securing home computer?

ANSWER

Install system security patches

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials