Knowledge Check Questions and
Answers | Latest Version | 2025/2026 |
Correct & Verified
What is the primary purpose of cybersecurity awareness training?
✔✔To educate personnel on protecting information systems and data from threats.
What should you do if you receive a suspicious email from an unknown sender?
✔✔Report it to your organization’s cybersecurity team and do not click any links.
What is considered personally identifiable information (PII)?
✔✔Information that can identify an individual, such as Social Security numbers or dates of birth.
How often should you change your network password according to DOD guidelines?
✔✔Every 60 to 90 days or as directed by policy.
What is the safest way to use removable media like USB drives?
✔✔Only use media provided and approved by the organization.
1
,Why should you avoid using public Wi-Fi for sensitive DOD work?
✔✔Public Wi-Fi is insecure and could allow attackers to intercept data.
What should you do if your computer is lost or stolen?
✔✔Immediately report it to your security officer or IT help desk.
Why is it important to lock your workstation when unattended?
✔✔To prevent unauthorized access to sensitive information.
What is a phishing attack?
✔✔An attempt to trick users into providing sensitive information by impersonating a trusted
source.
What is considered a secure password?
✔✔A combination of letters, numbers, and symbols that is difficult to guess.
What is multi-factor authentication (MFA)?
2
,✔✔A security process requiring two or more verification methods to access a system.
Why should you not share your login credentials with anyone?
✔✔Sharing credentials can compromise system security and accountability.
What is the purpose of a firewall?
✔✔To monitor and control incoming and outgoing network traffic based on security rules.
What should you do if you suspect malware on your computer?
✔✔Disconnect from the network and notify your cybersecurity team.
Why is it important to apply software updates promptly?
✔✔Updates fix vulnerabilities that could be exploited by attackers.
What is social engineering in cybersecurity?
✔✔Manipulating individuals into divulging confidential information or performing actions that
compromise security.
3
, Why should you encrypt sensitive files before sending them electronically?
✔✔To protect the data from unauthorized access during transmission.
What is the role of antivirus software?
✔✔To detect, prevent, and remove malicious software from a system.
Why is it important to back up your data regularly?
✔✔To ensure critical information can be recovered in case of system failure or attack.
What is the safest way to dispose of sensitive documents?
✔✔Shred or destroy them so that information cannot be reconstructed.
What is an insider threat?
✔✔A threat posed by someone within the organization who has authorized access but misuses it.
Why should you avoid clicking on pop-up ads while working on a DOD network?
✔✔Pop-ups can contain malware or phishing links that compromise security.
4