DOD CYBER AWARENESS TEST
QUESTIONS WITH 100% CORRECT
ANSWERS!!
What should you do after you have ended a call from a reporter asking you to confirm
potentially classified info found on the web?
Alert your security point of contact.
Which of the following actions is appropriate after finding classified Government
information on the internet?
Note any identifying information and the website's URL.
Which of these is true of unclassified data?
Its classification level may rise when aggregated.
What type of information includes personal, payroll, medical, and operational
information?
Sensitive
What is the best protection method for sharing Personally Identifiable Information (PII)?
Digitally sign and encrypt the email.
Which of the following is NOT a typical result from running malicious code?
Disables cookies.
Which of the following is a practice that helps to protect you from identity theft?
Ordering a credit report annually.
Which of the following describes an appropriate use of Government email?
Molly uses a digital signature when sending attachments or hyperlinks.
Which of the following is true of Internet hoaxes?
, They can be part of a distributed denial-of-service (DDoS) attack.
Which of the following is a practice that helps to prevent the download of viruses and other
malicious code when checking your email?
Do not access links or hyperlinked media such as buttons and graphics in email messages.
Upon connecting your Government-issued laptop to a public wireless connection, what
should you immediately do?
Connect to the Government Virtual Private Network (VPN).
Under what circumstances is it acceptable to check personal email on Government-
furnished equipment (GFE)?
If your organization allows it.
When checking in at the airline counter for a business trip...
Decline so that you maintain physical contact of your Government-issued laptop.
A man you do not know is trying to look at your Government-issued phone and has asked
to use it. What should you do?
Decline to lend the man your phone.
How can you protect your information when using wireless technology?
Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals.
What kind of information could reasonably be expected to cause serious damage to
national security in the event of unauthorized disclosure?
Top Secret
A colleague has visited several foreign countries recently...
. 2 indicators
Which of the following is NOT considered a potential insider threat indicator?
New interest in learning a foreign language.
QUESTIONS WITH 100% CORRECT
ANSWERS!!
What should you do after you have ended a call from a reporter asking you to confirm
potentially classified info found on the web?
Alert your security point of contact.
Which of the following actions is appropriate after finding classified Government
information on the internet?
Note any identifying information and the website's URL.
Which of these is true of unclassified data?
Its classification level may rise when aggregated.
What type of information includes personal, payroll, medical, and operational
information?
Sensitive
What is the best protection method for sharing Personally Identifiable Information (PII)?
Digitally sign and encrypt the email.
Which of the following is NOT a typical result from running malicious code?
Disables cookies.
Which of the following is a practice that helps to protect you from identity theft?
Ordering a credit report annually.
Which of the following describes an appropriate use of Government email?
Molly uses a digital signature when sending attachments or hyperlinks.
Which of the following is true of Internet hoaxes?
, They can be part of a distributed denial-of-service (DDoS) attack.
Which of the following is a practice that helps to prevent the download of viruses and other
malicious code when checking your email?
Do not access links or hyperlinked media such as buttons and graphics in email messages.
Upon connecting your Government-issued laptop to a public wireless connection, what
should you immediately do?
Connect to the Government Virtual Private Network (VPN).
Under what circumstances is it acceptable to check personal email on Government-
furnished equipment (GFE)?
If your organization allows it.
When checking in at the airline counter for a business trip...
Decline so that you maintain physical contact of your Government-issued laptop.
A man you do not know is trying to look at your Government-issued phone and has asked
to use it. What should you do?
Decline to lend the man your phone.
How can you protect your information when using wireless technology?
Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals.
What kind of information could reasonably be expected to cause serious damage to
national security in the event of unauthorized disclosure?
Top Secret
A colleague has visited several foreign countries recently...
. 2 indicators
Which of the following is NOT considered a potential insider threat indicator?
New interest in learning a foreign language.