DoD Annual TrainingAnswer Key

Reportable Insider Threat

62 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Which of the following is true of protecting classified data? (CLASSIFIED DATA)

ANSWER

Classified material must be appropriately marked.

QUESTION 2

A vendor conducting a pilot program with your organization contacts you for organizational data to use in a prototype. How should you respond? (CLASSIFIED DATA)

ANSWER

Refer the vendor to the appropriate personnel.

QUESTION 3

When classified data is not in use, how can you protect it? (CLASSIFIED DATA)

ANSWER

Store classified data appropriately in a GSA-approved vault/container.

QUESTION 4

What is the basis for handling and storage of classified data? (CLASSIFIED DATA)

ANSWER

Classification markings and handling caveats.

QUESTION 5

Which of the following is a good practice to protect classified information? (CLASSIFIED DATA)

ANSWER

Don't assume open storage in a secure facility is permitted.

QUESTION 6

Which of the following must you do before using an unclassified laptop and peripherals in a collateral classified environment? (CLASSIFIED DATA)

ANSWER

Ensure that any cameras, microphones, and Wi-Fi embedded in the laptop are physically disabled.

QUESTION 7

What level of damage to national security can you reasonably expect Top secret information to cause if disclosed? (CLASSIFIED DATA)

ANSWER

Exceptionally grave damage.

QUESTION 8

How should you secure your home wireless network for teleworking? (HOME COMPUTER SECURITY)

ANSWER

Implement Wi-Fi Protected Access 2 (WPA2) Personal encryption at a minimum.

QUESTION 9

Which of the following is true about telework? (HOME COMPUTER SECURITY)

ANSWER

You must have your organization's permission to telework.

QUESTION 10

Which of the following is a reportable insider threat activity? (INSIDER THREAT)

ANSWER

Attempting to access sensitive information without need-to-know.

QUESTION 11

Which scenario might indicate a reportable insider threat? (INSIDER THREAT)

ANSWER

A colleague removes sensitive information without seeking authorization in order to perform authorized telework.

QUESTION 12

Which of the following is a potential insider threat indicator? (INSIDER THREAT)

ANSWER

1) Unusual interest in classified information. 2) Difficult life circumstances, such as death of spouse.

QUESTION 13

Based on the description that follows, how many potential insider threat indicator(s) are displayed? A colleague saves money for an overseas vacation every year, is a single father, and occasionally consumes alcohol. (INSIDER THREAT)

ANSWER

0 indicators.

QUESTION 14

Which piece of information is safest to include on your social media profile? (SOCIAL NETWORKING)

ANSWER

Your favorite movie.

QUESTION 15

Which of the following statements is true? (SOCIAL NETWORKING)

ANSWER

1) Many apps and smart devices collect and share your personal information and contribute to your online identity. 2) Adversaries exploit social networking sites to disseminate fake news.

QUESTION 16

How can you protect your organization on social networking sites? (SOCIAL NETWORKING)

ANSWER

Ensure there are no identifiable landmarks visible in any photos taken in a work setting that you post.

QUESTION 17

Which designation marks information that does not have potential to damage national security? (CONTROLLED UNCLASSIFIED INFORMATION)

ANSWER

Unclassified.

QUESTION 18

Which of the following is true of Unclassified information? (CONTROLLED UNCLASSIFIED INFORMATION)

ANSWER

It is releasable to the public without clearance.??

QUESTION 19

Which is a best practice for protecting Controlled Unclassified Information (CUI)? (CONTROLLED UNCLASSIFIED INFORMATION)

ANSWER

Store it in a locked desk drawer after working hours.

QUESTION 20

Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? (CONTROLLED UNCLASSIFIED INFORMATION)

ANSWER

Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI.

QUESTION 21

Which designation includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? (CONTROLLED UNCLASSIFIED INFORMATION)

ANSWER

Controlled Unclassified Information (CUI).

QUESTION 22

Which of the following is NOT an example of CUI? (CONTROLLED UNCLASSIFIED INFORMATION)

ANSWER

Press release data.

QUESTION 23

Which of the following is NOT a correct way to protect CUI? (CONTROLLED UNCLASSIFIED INFORMATION)

ANSWER

CUI may be stored on any password-protected system.

QUESTION 24

Which of the following best describes good physical security? (PHYSICAL SECURITY)

ANSWER

Lionel stops an individual in his secure area who is not wearing a badge.

QUESTION 25

Which of the following is a best practice for physical security? (PHYSICAL SECURITY)

ANSWER

Report suspicious activity.

QUESTION 26

Which of the following is an example of two-factor authentication? (IDENTITY MANAGEMENT)

ANSWER

A Common Access Card and Personal Identification Number.

QUESTION 27

What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? (IDENTITY MANAGEMENT)

ANSWER

Store it in a shielded sleeve.

QUESTION 28

Which of the following is true of using a DoD Public Key Infrastructure (PKI) token? (IDENTITY MANAGEMENT)

ANSWER

It should only be in a system while actively using it for a PKI-required task.

QUESTION 29

What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)? (SENSITIVE COMPARTMENTED INFORMATION)

ANSWER

Confirm the individual's need-to-know and access.

QUESTION 30

Which of the following is true of Sensitive Compartmented Information (SCI)? (SENSITIVE COMPARTMENTED INFORMATION)

ANSWER

Access requires Top Secret clearance and indoctrination into the SCI program.

QUESTION 31

Which of the following is NOT a potential consequence of using removable media unsafely in a Sensitive Compartmented Information Facility (SCIF)? (SENSITIVE COMPARTMENTED INFORMATION)

ANSWER

Damage to the removable media.

QUESTION 32

Which of the following is true of transmitting Sensitive Compartmented Information (SCI)? (SENSITIVE COMPARTMENTED INFORMATION)

ANSWER

You many only transport SCI if you have been courier-briefed for SCI.

QUESTION 33

A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI _________. (SENSITIVE COMPARTMENTED INFORMATION)

ANSWER

In any manner.

QUESTION 34

What portable electronic devices (PEDs) are permitted in a SCIF? (REMOVABLE MEDIA IN A SCIF)

ANSWER

Only expressly authorized government-owned PEDs.

QUESTION 35

How should you label removable media used in a Sensitive Compartmented Information Facility (SCIF)? (REMOVABLE MEDIA IN A SCIF)

ANSWER

With the maximum classification, date of creation, point of contact, and Change Management (CM) Control Number.

QUESTION 36

What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF? (REMOVABLE MEDIA IN A SCIF)

ANSWER

All of these.

QUESTION 37

Which of the following is NOT a type of malicious code? (MALICIOUS CODE)

ANSWER

Executables.

QUESTION 38

Which of the following is a way to prevent the spread of malicious code? (MALICIOUS CODE)

ANSWER

Scan all external files before uploading to your computer.

QUESTION 39

Which of the following actions can help to protect your identity? (WEBSITE USE)

ANSWER

Shred personal documents.

QUESTION 40

Which is an appropriate use of government e-mail? (SOCIAL ENGINEERING)

ANSWER

Use a digital signature when sending attachments or hyperlinks.

QUESTION 41

What type of social engineering targets particular groups of people? (SOCIAL ENGINEERING)

ANSWER

Spear phishing.

QUESTION 42

What type of social engineering targets senior officials? (SOCIAL ENGINEERING)

ANSWER

Whaling.

QUESTION 43

How can you protect yourself from social engineering? (SOCIAL ENGINEERING)

ANSWER

Verify the identity of all individuals.

QUESTION 44

Which of the following is true? (SOCIAL ENGINEERING)

ANSWER

Digitally signed e-mails are more secure.

QUESTION 45

Which of the following is true of traveling overseas with a mobile phone? (TRAVEL)

ANSWER

A personally owned device approved under Bring Your Own Approved Device (BYOAD) policy must be unenrolled while out of the country.

QUESTION 46

Which of the following is a concern when using your Government-issued laptop in public? (TRAVEL)

ANSWER

The physical security of the device.

QUESTION 47

What should Sara do when using publicly available Internet, such as hotel Wi-Fi? (TRAVEL)

ANSWER

Only connect with Government VPN.

QUESTION 48

What is the danger of using public Wi-Fi connections? (TRAVEL)

ANSWER

Both of these.

QUESTION 49

Which of the following personally-owned computer peripherals is permitted for use with Government-furnished equipment? (USE OF GFE)

ANSWER

A headset with a microphone through a Universal Serial Bus (USB) port.

QUESTION 50

How can you protect data on your mobile computing and portable electronic devices (PEDs)? (MOBILE DEVICES)

ANSWER

Enable automatic screen locking after a period of inactivity.

QUESTION 51

Which of the following is NOT a risk associated with near field communication (NFC)? (MOBILE DEVICES)

ANSWER

Additional data charges.

QUESTION 52

Which of the following best describes the conditions under which mobile devices and applications can track your location? (MOBILE DEVICES)

ANSWER

It may occur at any time without your knowledge or consent.

QUESTION 53

Which of the following is an example of removable media? (MOBILE DEVICES)

ANSWER

External hard drive.

QUESTION 54

Which of the following is true of Internet of Things (IoT) devices?

ANSWER

They can become an attack vector to other devices on your home network.

QUESTION 55

When is it appropriate to have your security badge visible?

ANSWER

At all times when in the facility.

QUESTION 56

What should the owner of this printed SCI do differently?

ANSWER

Retrieve classified documents promptly from printers.

QUESTION 57

What should the participants in this conversation involving SCI do differently?

ANSWER

Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed.

QUESTION 58

Which of the following demonstrates proper protection of mobile devices?

ANSWER

Linda encrypts all of the sensitive data on her government-issued mobile devices.

QUESTION 59

Which of the following does NOT constitute spillage? (SPILLAGE)

ANSWER

Classified information that should be unclassified and is downgraded.

QUESTION 60

Which of the following is NOT an appropriate way to protect against inadvertent spillage? (SPILLAGE)

ANSWER

Use the classified network for all work, including unclassified work.

QUESTION 61

Which of the following may help to prevent spillage? (SPILLAGE)

ANSWER

Follow procedures for transferring data to and from outside agency and non-government networks.

QUESTION 62

Which of the following should you NOT do if you find classified information on the internet?

ANSWER

Download the information.

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials