Exam- Solved
Based on the description provided, how many insider threat indicators are present?
Edward has worked for the DoD agency for 2 years. He is an analyst who takes a great
deal of interest in his work. He occasionally takes a somewhat aggressive interest in
others' work as well, including asking for classified details of their projects. He otherwise
gets along well with his colleagues. - ANSWER-1-2 (Unsure)
Ref: Cyber Awareness Challenge 2025 / Detecting Insider Threats
Does it pose a risk to tap your smartwatch to pay for a purchase at a store? - ANSWER-
Only if you do not have two-factor authentication enables on your linked phone
How can you prevent viruses and malicious code? - ANSWER-Scan all e-mail
attachments (Correct)
Ref: Cyber Awareness Challenge 2025 / Protecting Against Malicious Code
How can you protect a mobile device while traveling? - ANSWER-Connect with a
Government VPN. (Correct)
Ref: Cyber Awareness Challenge 2025 / Traveling with Mobile Devices
How can you protect data on a mobile device? - ANSWER-Use two-factor
authentication
How can you protect your home computer? - ANSWER-Install spyware protection
software
How can you protect your home computer? - ANSWER-Use legitimate, known antivirus
software (Correct)
Install spyware protection software. (Correct)
Ref: Cyber Awareness Challenge 2025 / Best Practices for Home Computer Security
How can you protect yourself from identity theft? - ANSWER-Review your credit report
annually
How can you protect yourself on social networking sites? - ANSWER-Validate
connection requests through another source if possible. (Correct)
Ref: Cyber Awareness Challenge 2025 / Social Networking: Protect Yourself
, John receives an e-mail about a potential shutdown of a major social service unless a
petition receives enough signatures. Which of the following actions should John NOT
take with the e-mail? - ANSWER-Forward it (Correct)
Ref: Cyber Awareness Challenge 2025 / Phishing
Matt is a government employee who needs to share a document containing source
selection data with his supervisor. Which of the following describes the most appropriate
way for Matt to do this? - ANSWER-Encrypt it and send it via digitally signed
Government e-mail. (Correct)
Ref: Cyber Awareness Challenge 2025 / Protecting PII/PHI
Steve occasionally runs errands during virtual meetings. He joins the meetings using his
approved government device. Does this pose a security concern? - ANSWER-Yes.
Eavesdroppers may be listening to Steve's conversation
Tessa is processing payroll data that includes employees' names, home addresses, and
salary. Which of the following is Tessa prohibited from doing with the data? - ANSWER-
Using her home computer to print the data while working remotely. (Correct)
Ref: Cyber Awareness Challenge 2025 / Telework and Home Computer Security
Under which Cyberspace Protection Condition (CAPCON) is the priority focus limited to
critical functions? - ANSWER-CPCON 1 (Correct)
Ref: Cyber Awareness Challenge 2025 / Cyberspace Protection Conditions (CPCON)
What are the requirements for access to Sensitive Compartmented Information (SCI)? -
ANSWER-Top Secret clearance and indoctrination into the SCI program
What is a best practice for creating user accounts for your home computer? - ANSWER-
Create separate accounts for each user and have each user create their own password.
What is an insider threat? - ANSWER-Someone who uses authorized access, either
wittingly or unwittingly, to harm national security. (Correct)
Ref: Cyber Awareness Challenge 2025 / Insider Threat
When allowed, which of the following is an appropriate use of removable media? -
ANSWER-Labeling media that contains personally identifiable information (PII) (Correct)
Ref: Cyber Awareness Challenge 2025 / Appropriate Use of Removable Media
When is the safest time to post on social media about your work-related travel? -
ANSWER-After the trip (Correct)