DoD Annual TrainingAnswer Key

Two Factor Authentication Cyber Awareness

55 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

(Spillage) What should you do if a reporter asks you about potentially classified information on the web?

ANSWER

Refer the reporter to your organization's public affairs office.

QUESTION 2

(Spillage) Which of the following is a good practice to aid in preventing spillage?

ANSWER

Be aware of classification markings and all handling caveats.

QUESTION 3

(Spillage) After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. You know this project is classified. What should be your response?

ANSWER

Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity.

QUESTION 4

(Spillage) What should you do when you are working on an unclassified system and receive an email with a classified attachment?

ANSWER

Call your security point of contact immediately.

QUESTION 5

(Spillage) What is required for an individual to access classified data?

ANSWER

Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know.

QUESTION 6

(Spillage) When classified data is not in use, how can you protect it?

ANSWER

Store classified data appropriately in a GSA-approved vault/container.

QUESTION 7

(Insider Threat) A colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. How many potential insider threat indicators does this employee display?

ANSWER

0 indicators

QUESTION 8

(Insider Threat) Based on the description that follows, how many potential insider threat indicator(s) are displayed? A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information.

ANSWER

1 indicators

QUESTION 9

(Spillage) What type of activity or behavior should be reported as a potential insider threat?

ANSWER

Coworker making consistent statements indicative of hostility or anger toward the United States and its policies.

QUESTION 10

(Spillage) What advantages do "insider threats" have over others that allows them to cause damage to their organizations more easily?

ANSWER

Insiders are given a level of trust and have authorized access to Government information systems.

QUESTION 11

(Spillage) Which of the following is a best practice to protect information about you and your organization on social networking sites and applications?

ANSWER

Use only personal contact information when establishing personal social networking accounts, never use Government contact information.

QUESTION 12

(Spillage) When is the safest time to post details of your vacation activities on your social networking website?

ANSWER

When your vacation is over, after you have returned home

QUESTION 13

(social networking) When is the safest time to post details of your vacation activities on your social networking profile?

ANSWER

After you have returned home following the vacation

QUESTION 14

(Spillage) What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause?

ANSWER

Damage to national security

QUESTION 15

(Spillage) Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization?

ANSWER

Secret

QUESTION 16

(Spillage) Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status?

ANSWER

Remove your security badge after leaving your controlled area or office building.

QUESTION 17

(Sensitive Information) What type of unclassified material should always be marked with a special handling caveat?

ANSWER

For Official Use Only (FOUO)

QUESTION 18

(Sensitive Information) Which of the following is NOT an example of sensitive information?

ANSWER

Press release data

QUESTION 19

(Sensitive Information) Which of the following is true about unclassified data?

ANSWER

When unclassified data is aggregated, its classification level may rise.

QUESTION 20

(Sensitive Information) Which of the following represents a good physical security practice?

ANSWER

Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIV) card.

QUESTION 21

(Sensitive Information) What certificates are contained on the Common Access Card (CAC)?

ANSWER

Identification, encryption, and digital signature

QUESTION 22

(Sensitive Information) What should you do if a commercial entity, such as a hotel reception desk, asks to make a photocopy of your Common Access Card (CAC) for proof of Federal Government employment?

ANSWER

Do not allow your CAC to be photocopied.

QUESTION 23

(Sensitive Compartmented Information) What describes how Sensitive Compartmented Information is marked?

ANSWER

Approved Security Classification Guide (SCG)

QUESTION 24

(Sensitive Compartmented Information) Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)?

ANSWER

A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner.

QUESTION 25

(Sensitive Compartmented Information) What portable electronic devices (PEDs) are allow in a Secure Compartmented Information Facility (SCIF)?

ANSWER

Government-owned PEDs, if expressly authorized by your agency.

QUESTION 26

(Malicious Code) What are some examples of malicious code?

ANSWER

Viruses, Trojan horses, or worms

QUESTION 27

(Malicious Code) Which of the following is NOT a way that malicious code spreads?

ANSWER

Legitimate software updates

QUESTION 28

(Malicious Code) While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. The website requires a credit card for registration. What should you do?

ANSWER

Since the URL does not start with "https," do not provide your credit card information.

QUESTION 29

(Malicious Code) Which email attachments are generally SAFE to open?

ANSWER

Attachments contained in a digitally signed email from someone known

QUESTION 30

(Malicious Code) What is a common indicator of a phishing attempt?

ANSWER

It includes a threat of dire circumstances.

QUESTION 31

(Malicious Code) Which of the following is true of Internet hoaxes?

ANSWER

They can be part of a distributed denial-of-service (DDoS) attack.

QUESTION 32

(Malicious Code) Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?

ANSWER

Connect to the Government Virtual Private Network (VPN).

QUESTION 33

(Malicious Code) A coworker has asked if you want to download a programmer's game to play at work. What should be your response?

ANSWER

I'll pass

QUESTION 34

(Malicious Code) What are some examples of removable media?

ANSWER

Memory sticks, flash drives, or external hard drives

QUESTION 35

(Malicious Code) Which are examples of portable electronic devices (PEDs)?

ANSWER

laptops, fitness bands, tablets, smartphones, electric readers, and Bluetooth devices

QUESTION 36

(Malicious Code) What is a good practice to protect data on your home wireless systems?

ANSWER

Ensure that the wireless security features are properly configured.

QUESTION 37

(social networking) When may you be subjected to criminal, disciplinary, and/or administrative action due to online misconduct?

ANSWER

If you participate in or condone it at any time

QUESTION 38

(social networking) Which of the following is a security best practice when using social networking sites?

ANSWER

Use only personal contact information when establishing your personal account

QUESTION 39

(controlled unclassified information) Which of the following is NOT an example of CUI?

ANSWER

press release data

QUESTION 40

(controlled unclassified information) Which of the following is NOT correct way to protect CUI?

ANSWER

CUI may be stored on any password-protected system.

QUESTION 41

(Physical Security) which Cyberspace Protection Condition (CPCON) establishes a protection priority focus on critical and essential functions only?

ANSWER

(Answer) CPCON 2 (High: Critical and Essential Functions) - CPCON 1 (Very High: Critical Functions) CPCON 3 (Medium: Critical, Essential, and Support Functions) CPCON 4 (Low: All Functions) CPCON 5 (Very Low: All Functions)

QUESTION 42

(Identity Management) What certificates are contained on the Common Access Card (CAC)?

ANSWER

Identification, encryption, and digital signature

QUESTION 43

(Identity Management) Which of the following is an example of two-factor authentication?

ANSWER

Your password and the second commonly includes a text with a code sent to your phone

QUESTION 44

(Sensitive Information) What guidance is available from marking Sensitive Information information (SCI)?

ANSWER

Security Classification Guide (SCG)

QUESTION 45

(Sensitive Information) What must the dissemination of information regarding intelligence sources, methods, or activities follow?

ANSWER

The Director of National Intelligence.

QUESTION 46

(removable media) If an incident occurs involving removable media in a Sensitive Compartmented Information Facility (SCIF), what action should you take?

ANSWER

Notify your security point of contact

QUESTION 47

Which of the following actions can help to protect your identity?

ANSWER

Order a credit report annually

QUESTION 48

What is whaling?

ANSWER

Looking at your MOTHER, and screaming "THERE SHE BLOWS!!" (A type of phishing targeted at senior officials) Which is still your FAT A$$ MOTHER!

QUESTION 49

Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail?

ANSWER

Do not access website links, buttons, or graphics in e-mail

QUESTION 50

What type of social engineering targets particular individuals, groups of people, or organizations?

ANSWER

Spear phishing

QUESTION 51

(Travel) Which of the following is a concern when using your Government-issued laptop in public?

ANSWER

Others may be able to view your screen.

QUESTION 52

(GFE) When can you check personal e-mail on your Government-furnished equipment (GFE)?

ANSWER

If allowed by organizational policy

QUESTION 53

(Mobile Devices) Which of the following statements is true?

ANSWER

Mobile devices and applications can track your location without your knowledge or consent.

QUESTION 54

(Mobile Devices) When can you use removable media on a Government system?

ANSWER

When operationally necessary, owned by your organization, and approved by the appropriate authority

QUESTION 55

(Home computer) Which of the following is best practice for securing your home computer?

ANSWER

Create separate accounts for each user

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials