100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

DOD ANNUAL SECURITY AWARENESS REFRESHER (5 PARTS) | QUESTIONS AND ANSWERS | VERIFIED ANSWERS GRADED A+ | LATEST EXAM

Rating
-
Sold
-
Pages
17
Grade
A+
Uploaded on
21-12-2025
Written in
2025/2026

DOD ANNUAL SECURITY AWARENESS REFRESHER (5 PARTS) | QUESTIONS AND ANSWERS | VERIFIED ANSWERS GRADED A+ | LATEST EXAM

Institution
DOD ANNUAL SECURITY AWARENESS REFRESHER
Course
DOD ANNUAL SECURITY AWARENESS REFRESHER










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
DOD ANNUAL SECURITY AWARENESS REFRESHER
Course
DOD ANNUAL SECURITY AWARENESS REFRESHER

Document information

Uploaded on
December 21, 2025
Number of pages
17
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

DOD ANNUAL SECURITY AWARENESS REFRESHER (5
PARTS) | QUESTIONS AND ANSWERS | VERIFIED
ANSWERS GRADED A+ | LATEST EXAM




Part 1: Questions 1–50
1. What is the primary purpose of the DoD Security Awareness Program?
To protect national security information and systems by ensuring
personnel understand security responsibilities
2. Who is responsible for safeguarding classified and controlled unclassified
information (CUI)?
Every individual who handles or has access to the information
3. What does CUI stand for?
Controlled Unclassified Information
4. Which document establishes the DoD Cybersecurity Program?
DoD Instruction 8500.01
5. What classification level is applied to information that could cause
serious damage to national security?
Secret
6. What classification level is applied to information that could cause
exceptionally grave damage to national security?
Top Secret
7. Which of the following is an example of Personally Identifiable
Information (PII)?
Social Security number
8. What should you do if you suspect a phishing email?
Report it to your organization’s security or IT office
9. Which of the following is a common indicator of a phishing attempt?
Urgent language requesting immediate action

,10.What is the safest action when receiving an email from an unknown
sender with an attachment?
Do not open the attachment and report the email
11.What does OPSEC stand for?
Operations Security
12.What is the goal of OPSEC?
To prevent adversaries from obtaining sensitive information
13.Which information should never be shared on social media?
Sensitive mission-related details
14.What is considered a weak password?
A short password using common words
15.How often should passwords be changed according to DoD policy?
When compromised or as required by system policy
16.What is multifactor authentication (MFA)?
A security method requiring two or more forms of verification
17.Which of the following is an example of MFA?
Password and CAC
18.What should you do if your CAC is lost or stolen?
Report it immediately to security and your chain of command
19.What is spillage?
The improper transfer of classified or sensitive information to an
unauthorized system
20.What is the correct response to a spillage incident?
Stop work, secure the system, and report immediately
21.What is malware?
Malicious software designed to damage or disrupt systems
22.Which of the following is an example of malware?
Ransomware
23.What should you do before connecting removable media to a DoD
system?
Ensure it is authorized and scanned
24.What is the primary risk of using unauthorized USB devices?
Introduction of malware

, 25.What does the principle of least privilege mean?
Users are granted only the access necessary to perform their duties
26.Who approves access to classified information?
The appropriate security authority
27.What is insider threat?
A risk posed by individuals with authorized access who misuse it
28.Which behavior may indicate an insider threat?
Unusual downloading of large amounts of data
29.What should you do if you observe suspicious behavior?
Report it through proper channels
30.What is social engineering?
Manipulating individuals into divulging confidential information
31.Which method is commonly used in social engineering attacks?
Impersonation
32.What should you verify before sharing sensitive information?
The recipient’s identity and authorization
33.What is a secure practice when working remotely?
Use a VPN and approved devices
34.What should you do when leaving your workstation unattended?
Lock the screen
35.What is tailgating?
Unauthorized individuals following authorized personnel into secure
areas
36.How can tailgating be prevented?
Challenge or report unauthorized individuals
37.What is the proper disposal method for classified paper documents?
Approved shredding or destruction
38.What marking indicates information is classified?
Classification banners and portion markings
39.What does “need-to-know” mean?
Access is granted only if required for official duties
40.What is a data breach?
Unauthorized access to sensitive information

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
tutorlorghon University Of Massachusetts
View profile
Follow You need to be logged in order to follow users or courses
Sold
693
Member since
1 year
Number of followers
16
Documents
3575
Last sold
4 days ago
TutorLORGHON

On this page you will find Nursing exams , testbank exams and case study among other many exams. We sell the best exams. Buy and have no regrets.

4.7

234 reviews

5
198
4
22
3
8
2
3
1
3

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions