Cyber Awareness 2025 knowledge Prcatice questions and answers
Compiled by Professor Kevin
Which of the following is an Only leave it in a system while actively using it for a PKI-required task
appropriate use of a DoD Public
Key Infrastructure (PKI) token?
Which of the following is a best Look for h-t-t-p-s in the URL name
practice when browsing the
internet?
Which type of data could Confidential
reasonably be expected to cause
damage to national security?
How can you protect data on a Use two-factor authentication
mobile device?
Someone who uses authorized access, either wittingly or
What is an insider threat?
unwittingly, to harm national security.
Which of the following is an Using a digital signature when sending hyperlinks
appropriate use of government
e-mail?
What is a best practice for creating Create separate accounts for each user and have each user create
user accounts for your home their own password
computer?
Which of the following is NOT an Exchanging it for a visitor pass in another building
appropriate use of your Common
Access Card (CAC)?
, Does it pose a security risk to tap Yes. There is a risk that the signal could be intercepted and altered.
your smartwatch to pay for a
purchase at a store?
Which of the following is a Death of a spouse
potential insider threat
indicator?
Which of the following is a best Implement, as a minimum, Wi-Fi Protected Access 2 (WPA2) Personal
practice for protecting your encryption
home wireless network for
telework or remote work?
Which of the following is the safest Your favorite movie
to share on a social networking
site?
What are the requirements for Top Secret clearance and indoctrination into the SCI program
access to Sensitive
Compartmented Information
(SCI)?
Which of the following is true of The risks associated with them may lead to loss of life.
removable media and portable
electronic devices (PEDs)?
How can you protect your home Use legitimate, known antivirus software
computer?
How can you protect a mobile Connect with a Government VPN
device while traveling?
Based on the description 2
provided, how many insider
threat indicators are
present?
Edward has worked for a DoD
agency for 2 years. He is an analyst
who takes a great deal of interest
in his work. He
occasionally takes a somewhat
aggressive interest in others'
work as well, including asking for
classified details of their
projects. He otherwise gets along
well with his colleagues.
Which of the following is an bRobr@79l*P
Compiled by Professor Kevin
Which of the following is an Only leave it in a system while actively using it for a PKI-required task
appropriate use of a DoD Public
Key Infrastructure (PKI) token?
Which of the following is a best Look for h-t-t-p-s in the URL name
practice when browsing the
internet?
Which type of data could Confidential
reasonably be expected to cause
damage to national security?
How can you protect data on a Use two-factor authentication
mobile device?
Someone who uses authorized access, either wittingly or
What is an insider threat?
unwittingly, to harm national security.
Which of the following is an Using a digital signature when sending hyperlinks
appropriate use of government
e-mail?
What is a best practice for creating Create separate accounts for each user and have each user create
user accounts for your home their own password
computer?
Which of the following is NOT an Exchanging it for a visitor pass in another building
appropriate use of your Common
Access Card (CAC)?
, Does it pose a security risk to tap Yes. There is a risk that the signal could be intercepted and altered.
your smartwatch to pay for a
purchase at a store?
Which of the following is a Death of a spouse
potential insider threat
indicator?
Which of the following is a best Implement, as a minimum, Wi-Fi Protected Access 2 (WPA2) Personal
practice for protecting your encryption
home wireless network for
telework or remote work?
Which of the following is the safest Your favorite movie
to share on a social networking
site?
What are the requirements for Top Secret clearance and indoctrination into the SCI program
access to Sensitive
Compartmented Information
(SCI)?
Which of the following is true of The risks associated with them may lead to loss of life.
removable media and portable
electronic devices (PEDs)?
How can you protect your home Use legitimate, known antivirus software
computer?
How can you protect a mobile Connect with a Government VPN
device while traveling?
Based on the description 2
provided, how many insider
threat indicators are
present?
Edward has worked for a DoD
agency for 2 years. He is an analyst
who takes a great deal of interest
in his work. He
occasionally takes a somewhat
aggressive interest in others'
work as well, including asking for
classified details of their
projects. He otherwise gets along
well with his colleagues.
Which of the following is an bRobr@79l*P