100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

DOD CYBER AWARENESS QUIZ QUESTIONS AND ANSWERS

Rating
-
Sold
-
Pages
6
Grade
A+
Uploaded on
22-01-2026
Written in
2025/2026

DOD CYBER AWARENESS QUIZ QUESTIONS AND ANSWERS

Institution
DOD Cyber Awareness
Course
DOD Cyber Awareness









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
DOD Cyber Awareness
Course
DOD Cyber Awareness

Document information

Uploaded on
January 22, 2026
Number of pages
6
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

DOD CYBER AWARENESS QUIZ
QUESTIONS AND ANSWERS
Which of the following is a potential insider threat indicator? - ANSWER -1) Unusual
interest in classified information. 2) Difficult life circumstances, such as death of spouse.

Which piece of information is safest to include on your social media profile? - ANSWER
-Your favourite movie.

Which of the following statements is true? - ANSWER -Many apps and smart devices
collect and share your personal information and contribute to your online identity.

How can you protect your organization on social networking sites? - ANSWER -Ensure
there are no identifiable landmarks visible in any photos taken in a work setting that you
post.

Which is a best practice for protecting Controlled Unclassified Information (CUI)? -
ANSWER -Store it in a locked desk drawer after working hours.

Which of the following best describes a way to safely transmit Controlled Unclassified
Information (CUI)? - ANSWER -Paul verifies that the information is CUI, includes a CUI
marking in the subject header, and digitally signs an e-mail containing CUI.

Which designation includes Personally Identifiable Information (PII) and Protected
Health Information (PHI)? - ANSWER -Controlled Unclassified Information (CUI)

Which of the following is NOT an example of CUI? - ANSWER -Press release data.

Which of the following is NOT a correct way to protect CUI? - ANSWER -CUI may be
stored on any password-protected system.

Which of the following best describes good physical security? - ANSWER -Lionel stops
an individual in his secure area who is not wearing a badge.

Which of the following is an example of two-factor authentication? - ANSWER -A
Common Access Card and Personal Identification Number.

What is the best way to protect your Common Access Card (CAC) or Personal Identity
Verification (PIV) card? - ANSWER -Store it in a shielded sleeve.

A vendor conducting a pilot program with your organization contacts you for
organizational data to use in a prototype. How should you respond? - ANSWER -Refer
the vendor to the appropriate personnel.

, When classified data is not in use, how can you protect it? - ANSWER -Store classified
data appropriately in a GSA-approved vault/container.

What is the basis for handling and storage of classified data? - ANSWER -Classification
markings and handling caveats.

Which of the following must you do before using an unclassified laptop and peripherals
in a collateral classified environment? - ANSWER -Ensure that any cameras,
microphones, and Wi-Fi embedded in the laptop are physically disabled.

What level of damage to national security can you reasonably expect Top secret
information to cause if disclosed? - ANSWER -Exceptionally grave damage.

Which of the following is true about telework? - ANSWER -You must have your
organization's permission to telework.

Which of the following is true of protecting classified data? - ANSWER -Classified
material must be appropriately marked.

Which of the following is a reportable insider threat activity? - ANSWER -Attempting to
access sensitive information without need-to-know.

Which scenario might indicate a reportable insider threat? - ANSWER -a colleague
removes sensitive information without seeking authorization in order to perform
authorized telework.

What must authorized personnel do before permitting another individual to enter a
Sensitive Compartmented Information Facility (SCIF)? - ANSWER -Confirm the
individual's need-to-know and access.

Which of the following is true of Sensitive Compartmented Information (SCI)? -
ANSWER -Access requires Top Secret clearance and indoctrination into the SCI
program.

Which of the following is NOT a potential consequence of using removable media
unsafely in a Sensitive Compartmented Information Facility (SCIF)? - ANSWER -
Damage to the removable media.

What portable electronic devices (PEDs) are permitted in a SCIF? - ANSWER -Only
expressly authorized government-owned PEDs.

What is the response to an incident such as opening an uncontrolled DVD on a
computer in a SCIF? - ANSWER -All of these.

Which of the following is NOT a type of malicious code? - ANSWER -Executables.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
biggdreamer Havard School
View profile
Follow You need to be logged in order to follow users or courses
Sold
252
Member since
2 year
Number of followers
67
Documents
18101
Last sold
4 days ago

4.0

38 reviews

5
22
4
4
3
6
2
2
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions