DOD CYBER AWARENESS EXAM
REVIEW GUIDE QUESTIONS WITH
COMPLETE SOLUTIONS
Which best describes an insider threat? Someone who uses ______ access, ______, to
harm national security through unauthorized disclosure, data modification, espionage,
terrorism, or kinetic actions. - ANSWER -authorized; wittingly or unwittingly
Which of the following uses of removable media is allowed? - ANSWER -Government
owned removable media that is approved as operationally necessary.
Which of the following is true of transmitting or transporting Sensitive Compartmented
Information (SCI)? - ANSWER -Printed SCI must be retrieved promptly from the printer.
Which of the following is a best practice for using government e-mail? - ANSWER -Do
not send mass e-mails.
Which of the following is an appropriate use of government e-mail? - ANSWER -Using a
digital signature when sending attachments.
How can you mitigate the ptential rish associated with a compressed URL (e.g.,
TinyURL, goo.gl)? - ANSWER -Use the preview function to see where the link actually
leads.
Which of the following statements about Portected Health Information (PHI) is false? -
ANSWER -It is created or received by a healthcare provider, health plan, or employer or
a business associate of these.
When is the safest time to post on social media about your vacation plans? - ANSWER
-After the trip.
Which type of data could reasonable be expected to cause serious damage to national
security? - ANSWER -Secret
Which of the following is a best practice for physical security? - ANSWER -Use your
own security badge or key code for facility access.
Which of these is NOT a potential indicator that your device may be under a malicious
code attack? - ANSWER -A notification for a system update that has been publicized
Which of the following is true of Controlled Unclassified Information (CUI)? - ANSWER -
It must be handled using safeguarding or dissemination controls.
REVIEW GUIDE QUESTIONS WITH
COMPLETE SOLUTIONS
Which best describes an insider threat? Someone who uses ______ access, ______, to
harm national security through unauthorized disclosure, data modification, espionage,
terrorism, or kinetic actions. - ANSWER -authorized; wittingly or unwittingly
Which of the following uses of removable media is allowed? - ANSWER -Government
owned removable media that is approved as operationally necessary.
Which of the following is true of transmitting or transporting Sensitive Compartmented
Information (SCI)? - ANSWER -Printed SCI must be retrieved promptly from the printer.
Which of the following is a best practice for using government e-mail? - ANSWER -Do
not send mass e-mails.
Which of the following is an appropriate use of government e-mail? - ANSWER -Using a
digital signature when sending attachments.
How can you mitigate the ptential rish associated with a compressed URL (e.g.,
TinyURL, goo.gl)? - ANSWER -Use the preview function to see where the link actually
leads.
Which of the following statements about Portected Health Information (PHI) is false? -
ANSWER -It is created or received by a healthcare provider, health plan, or employer or
a business associate of these.
When is the safest time to post on social media about your vacation plans? - ANSWER
-After the trip.
Which type of data could reasonable be expected to cause serious damage to national
security? - ANSWER -Secret
Which of the following is a best practice for physical security? - ANSWER -Use your
own security badge or key code for facility access.
Which of these is NOT a potential indicator that your device may be under a malicious
code attack? - ANSWER -A notification for a system update that has been publicized
Which of the following is true of Controlled Unclassified Information (CUI)? - ANSWER -
It must be handled using safeguarding or dissemination controls.