DoD Annual TrainingAnswer Key

What Should The Employee Do Differently Cyber Awareness

35 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Did you earn a Cyber Security Awareness Challenge 2018 Certificate of Completion?

ANSWER

No

QUESTION 2

Which of the following does NOT constitute spillage?

ANSWER

Classified information that should be unclassified and is downgraded

QUESTION 3

Which of the following is NOT an appropriate way to protect against inadvertent spillage?

ANSWER

Use the classified network for all work, including unclassified work

QUESTION 4

Which of the following should you NOT do if you find classified information on the internet?

ANSWER

Download the information

QUESTION 5

What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed?

ANSWER

Exceptionally grave damage

QUESTION 6

Which of the following is true about telework?

ANSWER

You must have your organization's permission to telework.

QUESTION 7

Which of the following is true of protecting classified data?

ANSWER

Classified material must be appropriately marked.

QUESTION 8

In addition to avoiding the temptation of greed to betray his country, what should Alex do differently?

ANSWER

Avoid talking about work outside of the workplace or with people without a need-to-know

QUESTION 9

Ellen's Statement How many insider threat indicators does Alex demonstrate?

ANSWER

Three or more

QUESTION 10

Mark's Statement What should Alex's colleagues do?

ANSWER

Report the suspicious behavior in accordance with their organization's insider threat policy

QUESTION 11

Select all sections of the profile that contain an issue. Then select Submit.

ANSWER

All three sections

QUESTION 12

Select the appropriate setting for each item. Then select Save.

ANSWER

Name and profile picture - Any Status, photos, and posts - Friends Only Family and relationships - Friends Only Birthday - Friends Only Photos and videos you are in - Friends Only Check in location via GPS: Off

QUESTION 13

Which of the following is NOT an example of sensitive information?

ANSWER

Press release data

QUESTION 14

Which of the following is NOT a correct way to protect sensitive information?

ANSWER

Sensitive information may be stored on any password-protected system.

QUESTION 15

Victim Select the information on the data sheet that is personally identifiable information (PII) but not protected health information (PHI).

ANSWER

Top box

QUESTION 16

Select the information on the data sheet that is protected health information (PHI).

ANSWER

Bottom box

QUESTION 17

Incident #1 What should the employee do differently?

ANSWER

Remove his CAC and lock his workstation.

QUESTION 18

Incident #2 What should the employee do differently?

ANSWER

Decline to let the person in and redirect her to security.

QUESTION 19

Incident Select all violations at this unattended workstation. Then select Submit.

ANSWER

Laptop with CAC left inserted Sticky note with Pin number

QUESTION 20

Prevalence Which of the following is an example of malicious code?

ANSWER

Software that installs itself without the user's knowledge

QUESTION 21

Damage How can malicious code cause damage?

ANSWER

All of these

QUESTION 22

Spread How can you avoid downloading malicious code?

ANSWER

Do not access website links in e-mail messages

QUESTION 23

Incident Select all security issues. Then select Submit.

ANSWER

Top and Bottom sections

QUESTION 24

From Alice Murphy Select an action.

ANSWER

Delete e-mail

QUESTION 25

From Pursuit Bank Select an action.

ANSWER

Delete e-mail

QUESTION 26

From John Anderson Select an action.

ANSWER

Report e-mail

QUESTION 27

Incident What should Sara do when using publicly available Internet, such as hotel Wi-Fi?

ANSWER

Only connect Government VPN

QUESTION 28

What is the danger of using public Wi-Fi connetions?

ANSWER

Both of these

QUESTION 29

Incident Select Yes or No for each item. Then select Submit. (Permitted Uses of Government-Furnished Equipment GFE))

ANSWER

Viewing or downloading pornography - No Gambling online - No Conducting a private money-making venture - No Using unauthorized software - No Illegally downloading copyrighted material - No Making unauthorized configuration changes - No

QUESTION 30

Incident When is it okay to charge a personal mobile device using government-furnished equipment (GFE)?

ANSWER

This is never okay.

QUESTION 31

Which of the following demonstrates proper protection of mobile devices?

ANSWER

Linda encrypts all of the sensitive data on her government-issued mobile devices.

QUESTION 32

Evidence Your antivirus is out-of-date. Update now?

ANSWER

Update

QUESTION 33

Security updates are ready to install. Install now?

ANSWER

Install

QUESTION 34

Firewall disabled. Would you like to enable the firewall?

ANSWER

Enable

QUESTION 35

A virus has been detected.

ANSWER

Exit

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials