DOD CYBER AWARENESS EXAM
QUESTIONS WITH COMPLETE
ANSWERS
how can you prevent viruses and malicious code - ANSWER -scan all e-mail
attachments
Steve occasionally runs errands during virtual meetings. he joins the meetings using his
approved gov. device. does this pose a security concern? - ANSWER -yes, the easy
droppers could be listening
which of the following is true of compressed urls - ANSWER -can be used to mask
malicious intent
as you scroll through your social media feed, a news headline catches your eye. what
should you consider before sharing it with your connections - ANSWER -credibility
which of the following is true of CUI - ANSWER -it belongs to a defined category
established in the DoD CUI registry.
which of the following is an allowed GFE - ANSWER -emailing your supervisor
what is a best practices for creating user accounts for your home computer - ANSWER -
create separate accounts and each user makes their own password
you receive an email marked important from your agency head asking you to call them
using a n umber you do not recognize. the email was sent from a personal email
address that you do not recognize, but it addresses you by name. what action should
you take - ANSWER -spear phishing attempt. report it
how can you protect a mobile device while traveling - ANSWER -gov. vpn
how can malicious code do damage - ANSWER -all of these
which of the following is true of spillage - ANSWER -It can be either inadvertent or
intentional
how can you protect yourself from social networking sites - ANSWER -validate the
connection requests through another source
you receive a text message from a vendor notifying you that your order is on hold due to
needing updated payment information from you. it provides a shortened link for you to
QUESTIONS WITH COMPLETE
ANSWERS
how can you prevent viruses and malicious code - ANSWER -scan all e-mail
attachments
Steve occasionally runs errands during virtual meetings. he joins the meetings using his
approved gov. device. does this pose a security concern? - ANSWER -yes, the easy
droppers could be listening
which of the following is true of compressed urls - ANSWER -can be used to mask
malicious intent
as you scroll through your social media feed, a news headline catches your eye. what
should you consider before sharing it with your connections - ANSWER -credibility
which of the following is true of CUI - ANSWER -it belongs to a defined category
established in the DoD CUI registry.
which of the following is an allowed GFE - ANSWER -emailing your supervisor
what is a best practices for creating user accounts for your home computer - ANSWER -
create separate accounts and each user makes their own password
you receive an email marked important from your agency head asking you to call them
using a n umber you do not recognize. the email was sent from a personal email
address that you do not recognize, but it addresses you by name. what action should
you take - ANSWER -spear phishing attempt. report it
how can you protect a mobile device while traveling - ANSWER -gov. vpn
how can malicious code do damage - ANSWER -all of these
which of the following is true of spillage - ANSWER -It can be either inadvertent or
intentional
how can you protect yourself from social networking sites - ANSWER -validate the
connection requests through another source
you receive a text message from a vendor notifying you that your order is on hold due to
needing updated payment information from you. it provides a shortened link for you to