DOD CYBER AWARENESS EXAM SET
REVIEW QUESTIONS AND ANSWERS
You receive a phone call from an unknown person asking for a directory name on your
government furnished laptop so that a software update can be made. Which course of
action should you take? - ANSWER -Document the interaction and contact your security
POC or help desk.
You receive a text message from a vendor notifying you that your order is on hold due
to needing updated payment information from you. It provides a shortened link for you
to provide the needed information. What is the best course of action? - ANSWER -
Delete the message
Which of the following is true of removable media and portable electronic devices
(PEDs)? - ANSWER -They cannot be adequately secured, so they are prohibited by the
DoD.
How can you protect a mobile device while traveling? - ANSWER -Connect with a
Government VPN
Which of these is NOT a potential indicator that your device may be under a malicious
code attack? - ANSWER -An operating system update
Which of the following can be used to catalogue information about you? - ANSWER -All
of these
When allowed, which of the following is an appropriate use of removable media? -
ANSWER -Labeling media that contains personally identifiable information (PII)
As you scroll through your social media feed, a news headline catches your eye. What
should you consider before sharing it with your connections? - ANSWER -Whether the
source is credible and reliable
Which of the following statements is true of DoD Unclassified data? - ANSWER -Do not
have the potential to damage national security.
As you browse a social media site, you come across photos of information with
classification markings. What should you do? - ANSWER -Notify your security point of
contact
What is a best practice for creating user accounts for your home computer? - ANSWER
-Create separate accounts for each user and have each user create their own
password.
REVIEW QUESTIONS AND ANSWERS
You receive a phone call from an unknown person asking for a directory name on your
government furnished laptop so that a software update can be made. Which course of
action should you take? - ANSWER -Document the interaction and contact your security
POC or help desk.
You receive a text message from a vendor notifying you that your order is on hold due
to needing updated payment information from you. It provides a shortened link for you
to provide the needed information. What is the best course of action? - ANSWER -
Delete the message
Which of the following is true of removable media and portable electronic devices
(PEDs)? - ANSWER -They cannot be adequately secured, so they are prohibited by the
DoD.
How can you protect a mobile device while traveling? - ANSWER -Connect with a
Government VPN
Which of these is NOT a potential indicator that your device may be under a malicious
code attack? - ANSWER -An operating system update
Which of the following can be used to catalogue information about you? - ANSWER -All
of these
When allowed, which of the following is an appropriate use of removable media? -
ANSWER -Labeling media that contains personally identifiable information (PII)
As you scroll through your social media feed, a news headline catches your eye. What
should you consider before sharing it with your connections? - ANSWER -Whether the
source is credible and reliable
Which of the following statements is true of DoD Unclassified data? - ANSWER -Do not
have the potential to damage national security.
As you browse a social media site, you come across photos of information with
classification markings. What should you do? - ANSWER -Notify your security point of
contact
What is a best practice for creating user accounts for your home computer? - ANSWER
-Create separate accounts for each user and have each user create their own
password.