DOD CYBER AWARENESS TEST
REVIEW QUESTIONS WITH COMPLETE
SOLUTIONS
How do Insider Threat Programs defend against insider threats? - ANSWER -A.
Restricting individuals' access to government resources
B. Intervening early to help individuals with issues
C. Imprisoning anyone who exhibits a threat indicator
D. Terminating the employment of any individual who exhibits a threat indicator
The correct answer is B. Intervening early to help individuals with issues
Which of the following is a best practice for working offsite during official travel? -
ANSWER -A. Position your monitor so that it is not easily observed by others while in
use
B. Work in well-populated public areas to ensure your physical safety
C. Download or print any classified documents you will need while away from your
secure workspace
D. Use personal equipment to connect to the Government Virtual Private Network
(VPN)
The correct answer is: A. Position your monitor so that it is not easily observed by
others while in use.
How does an insider threat harm national security? - ANSWER -A. Documenting
standard operating procedures for operational processes
B. Underperforming their job duties
C. Exploiting their trusted status and authorized access to government resources
D. Threatening to quit their job unless given a promotion and salary increase
The correct answer is: C. Exploiting their trusted status and authorized access to
government resources.
Which of the following formats may be considered official records for Government
communications? - ANSWER -A. E-mail
B. Chat
C. SMS messaging
D. All of these
The correct answer is: D. All of the above.
Which of the following is true of transmitting Sensitive Compartmented Information
(SCI)? - ANSWER -A. SCI may be faxed using any facsimile machine.
, B. SCI may be printed using an authorized printer when retrieved promptly.
C. SCI may only be transmitted electronically.
D. SCI must never be escorted, hand-carried, or couriered.
The correct answer is: B. SCI may be printed using an authorized printer when retrieved
promptly.
Travis is processing travel reimbursements for the past quarter and needs to share
travel rosters containing passport numbers with his supervisor for approval. Which is an
approved way to transmit this information? - ANSWER -A. Printout left on the
supervisor's chair in an unsecured area
B. Any e-mail account with multifactor authentication enabled
C. Encrypted third-party application
D. Encrypted Government e-mail with a digital signature
The correct answer is: D. Encrypted Government e-mail with a digital signature
Martha supervises a government unit. To improve morale, she frequently e-mails
inspirational stories and photos with inspirational quotes on them to her team. Is this an
appropriate use of government e-mail? - ANSWER -A. No. These e-mails generate
unnecessary e-mail traffic.
B. Yes. The e-mails don't harm anything and are sent with good intentions.
C. Maybe. It depends on whether her team is offended by these e-mails.
D. Maybe. It depends on the file size of the photos.
The correct answer is: A. No. These e-mails generate unnecessary e-mail traffic.
Peter enters an empty conference room and finds a document with a Top Secret
coversheet on it. Peter has a Secret clearance. What should Peter do? - ANSWER -A.
Immediately notify his security POC and not handle the file
B. Verify that the document contains Top Secret information
C. Assume the facility has open storage and leave the document for the owner to return
for it
D. Destroy the document using any means available
The correct answer is A. Immediately notify his security POC and not handle the file.
Which of the following is an example of two-factor authentication? - ANSWER -A.
Command Access Card (CAC) and security token
B. Password and fingerprint
C. Fingerprint and face identification (ID)
D. Password and Personal Identification Number (PIN)
The correct answer is B. Password and fingerprint.
REVIEW QUESTIONS WITH COMPLETE
SOLUTIONS
How do Insider Threat Programs defend against insider threats? - ANSWER -A.
Restricting individuals' access to government resources
B. Intervening early to help individuals with issues
C. Imprisoning anyone who exhibits a threat indicator
D. Terminating the employment of any individual who exhibits a threat indicator
The correct answer is B. Intervening early to help individuals with issues
Which of the following is a best practice for working offsite during official travel? -
ANSWER -A. Position your monitor so that it is not easily observed by others while in
use
B. Work in well-populated public areas to ensure your physical safety
C. Download or print any classified documents you will need while away from your
secure workspace
D. Use personal equipment to connect to the Government Virtual Private Network
(VPN)
The correct answer is: A. Position your monitor so that it is not easily observed by
others while in use.
How does an insider threat harm national security? - ANSWER -A. Documenting
standard operating procedures for operational processes
B. Underperforming their job duties
C. Exploiting their trusted status and authorized access to government resources
D. Threatening to quit their job unless given a promotion and salary increase
The correct answer is: C. Exploiting their trusted status and authorized access to
government resources.
Which of the following formats may be considered official records for Government
communications? - ANSWER -A. E-mail
B. Chat
C. SMS messaging
D. All of these
The correct answer is: D. All of the above.
Which of the following is true of transmitting Sensitive Compartmented Information
(SCI)? - ANSWER -A. SCI may be faxed using any facsimile machine.
, B. SCI may be printed using an authorized printer when retrieved promptly.
C. SCI may only be transmitted electronically.
D. SCI must never be escorted, hand-carried, or couriered.
The correct answer is: B. SCI may be printed using an authorized printer when retrieved
promptly.
Travis is processing travel reimbursements for the past quarter and needs to share
travel rosters containing passport numbers with his supervisor for approval. Which is an
approved way to transmit this information? - ANSWER -A. Printout left on the
supervisor's chair in an unsecured area
B. Any e-mail account with multifactor authentication enabled
C. Encrypted third-party application
D. Encrypted Government e-mail with a digital signature
The correct answer is: D. Encrypted Government e-mail with a digital signature
Martha supervises a government unit. To improve morale, she frequently e-mails
inspirational stories and photos with inspirational quotes on them to her team. Is this an
appropriate use of government e-mail? - ANSWER -A. No. These e-mails generate
unnecessary e-mail traffic.
B. Yes. The e-mails don't harm anything and are sent with good intentions.
C. Maybe. It depends on whether her team is offended by these e-mails.
D. Maybe. It depends on the file size of the photos.
The correct answer is: A. No. These e-mails generate unnecessary e-mail traffic.
Peter enters an empty conference room and finds a document with a Top Secret
coversheet on it. Peter has a Secret clearance. What should Peter do? - ANSWER -A.
Immediately notify his security POC and not handle the file
B. Verify that the document contains Top Secret information
C. Assume the facility has open storage and leave the document for the owner to return
for it
D. Destroy the document using any means available
The correct answer is A. Immediately notify his security POC and not handle the file.
Which of the following is an example of two-factor authentication? - ANSWER -A.
Command Access Card (CAC) and security token
B. Password and fingerprint
C. Fingerprint and face identification (ID)
D. Password and Personal Identification Number (PIN)
The correct answer is B. Password and fingerprint.