DOD CYBER AWARENESS (DOD-IAA-
V18.0) KNOWLEDGE CHECK EXAM
QUESTIONS AND ANSWERS
How many potential insider threat indicators does a person who is playful and charming,
consistently wins performance awards, but is occasionally aggressive in trying to access
sensitive information display? - ANSWER -1 indicator
Which of the following is NOT considered a potential insider threat indicator? -
ANSWER -New interest in learning a foreign language
What should you do if you receive a game application request that includes permission
to access your friends, profile information, cookies, and sites visited? - ANSWER -
Decline the request.
What information posted publicly on your personal social networking profile represents a
security risk? - ANSWER -Your place of birth
Sensitive Information:
Which of the following is an example of Protected Health Information (PHI)? - ANSWER
-Medical test results
Which of the following is the best example of Personally Identifiable Information (PII)? -
ANSWER -Passport number
What type of unclassified material should always be marked with a special handling
caveat? - ANSWER -Official use only
Is it acceptable to take a short break while a coworker monitors your computer while
logged on with your Common Access Card (CAC)? - ANSWER -No. Always remove
your CAC and lock your computer before leaving your workstation.
What is the best way to protect your common access card? - ANSWER -Maintain
possession of it at all times.
Spillage:
What should you do if a reporter asks you about potentially classified information on the
web? - ANSWER -Refer the reporter to your organization's public affair office
What should you do when you are working on an unclassified system and receive an
email with a classified attachment? - ANSWER -Call your security point of contact
immediately.
V18.0) KNOWLEDGE CHECK EXAM
QUESTIONS AND ANSWERS
How many potential insider threat indicators does a person who is playful and charming,
consistently wins performance awards, but is occasionally aggressive in trying to access
sensitive information display? - ANSWER -1 indicator
Which of the following is NOT considered a potential insider threat indicator? -
ANSWER -New interest in learning a foreign language
What should you do if you receive a game application request that includes permission
to access your friends, profile information, cookies, and sites visited? - ANSWER -
Decline the request.
What information posted publicly on your personal social networking profile represents a
security risk? - ANSWER -Your place of birth
Sensitive Information:
Which of the following is an example of Protected Health Information (PHI)? - ANSWER
-Medical test results
Which of the following is the best example of Personally Identifiable Information (PII)? -
ANSWER -Passport number
What type of unclassified material should always be marked with a special handling
caveat? - ANSWER -Official use only
Is it acceptable to take a short break while a coworker monitors your computer while
logged on with your Common Access Card (CAC)? - ANSWER -No. Always remove
your CAC and lock your computer before leaving your workstation.
What is the best way to protect your common access card? - ANSWER -Maintain
possession of it at all times.
Spillage:
What should you do if a reporter asks you about potentially classified information on the
web? - ANSWER -Refer the reporter to your organization's public affair office
What should you do when you are working on an unclassified system and receive an
email with a classified attachment? - ANSWER -Call your security point of contact
immediately.