Page | 1
Cyber Awareness Knowledge Check
Questions with Detailed Verified
Answers
Question: Which of the following is a good practice for telework?
Ans: Use a Virtual Private Network (VPN) to obscure your true geographic
location
Question: What level of damage can the unauthorized disclosure of
information classified as Confidential reasonably be expected to cause?
Ans: Damage to National Security
Question: Which of the following is a potential insider threat indicator?
Ans: Difficult life circumstances, such as death of a spouse
Question: How can you protect your organization on social networking sites?
Ans: Validate friend requests through another source before confirming
them
Question: Which of the following is a security best practice when using social
networking sites?
For academic expert services contact me at
, Page | 2
Ans: Avoiding posting your mothers maiden name
Question: Which of the following statements is true?
Ans: Many apps and smart devices collect and share your personal
information and contribute to your online identity.
Question: Which is a best practice for protecting Controlled Unclassified
Information (CUI)?
Ans: Store it in a locked desk drawer after working hours.
Question: Which of the following is a security best practice for protecting
Personally Identifiable Information (PII)?
Ans: Only use Government-approved equipment to process PII.
Question: Which of the following best describes a way to safely transmit
Controlled Unclassified Information (CUI)?
Ans: Paul verifies that the information is CUI, includes a CUI marking in
the subject header, and digitally signs an e-mail containing CUI.
Question: Which of the following best describes good physical security?
Ans: Lionel stops an individual in his secure area who is not wearing a
badge.
For academic expert services contact me at
Cyber Awareness Knowledge Check
Questions with Detailed Verified
Answers
Question: Which of the following is a good practice for telework?
Ans: Use a Virtual Private Network (VPN) to obscure your true geographic
location
Question: What level of damage can the unauthorized disclosure of
information classified as Confidential reasonably be expected to cause?
Ans: Damage to National Security
Question: Which of the following is a potential insider threat indicator?
Ans: Difficult life circumstances, such as death of a spouse
Question: How can you protect your organization on social networking sites?
Ans: Validate friend requests through another source before confirming
them
Question: Which of the following is a security best practice when using social
networking sites?
For academic expert services contact me at
, Page | 2
Ans: Avoiding posting your mothers maiden name
Question: Which of the following statements is true?
Ans: Many apps and smart devices collect and share your personal
information and contribute to your online identity.
Question: Which is a best practice for protecting Controlled Unclassified
Information (CUI)?
Ans: Store it in a locked desk drawer after working hours.
Question: Which of the following is a security best practice for protecting
Personally Identifiable Information (PII)?
Ans: Only use Government-approved equipment to process PII.
Question: Which of the following best describes a way to safely transmit
Controlled Unclassified Information (CUI)?
Ans: Paul verifies that the information is CUI, includes a CUI marking in
the subject header, and digitally signs an e-mail containing CUI.
Question: Which of the following best describes good physical security?
Ans: Lionel stops an individual in his secure area who is not wearing a
badge.
For academic expert services contact me at