Cyber Awareness 2025 Knowledge Check
Answers 100% Pass
Which of the following is an appropriate use of a DoD Public Key
Infrastructure (PKI) token? -
[ANSWER]: Only leave it in a system while actively using it for a PKI-
required task
QUESTION: Which of the following is a best practice when browsing
the internet? -
[ANSWER]: Look for h-t-t-p-s in the URL name
QUESTION: Which type of data could reasonably be expected to
cause damage to national security? -
[ANSWER]: Confidential
,QUESTION: How can you protect data on a mobile device? -
[ANSWER]: Use two-factor authentication
QUESTION: What is an insider threat? -
[ANSWER]: Someone who uses authorized access, either wittingly or
unwittingly, to harm national security.
QUESTION: Which of the following is an appropriate use of
government e-mail? -
[ANSWER]: Using a digital signature when sending hyperlinks
QUESTION: What is a best practice for creating user accounts for your
home computer? -
[ANSWER]: Create separate accounts for each user and have each user
create their own password
, QUESTION: Which of the following is NOT an appropriate use of
your Common Access Card (CAC)? -
[ANSWER]: Exchanging it for a visitor pass in another building
QUESTION: Does it pose a security risk to tap your smartwatch to pay
for a purchase at a store? -
[ANSWER]: Yes. There is a risk that the signal could be intercepted and
altered.
QUESTION: Which of the following is a potential insider threat
indicator? -
[ANSWER]: Death of a spouse
QUESTION: Which of the following is a best practice for protecting
your home wireless network for telework or remote work? -
[ANSWER]: Implement, as a minimum, Wi-Fi Protected Access 2
(WPA2) Personal encryption
Answers 100% Pass
Which of the following is an appropriate use of a DoD Public Key
Infrastructure (PKI) token? -
[ANSWER]: Only leave it in a system while actively using it for a PKI-
required task
QUESTION: Which of the following is a best practice when browsing
the internet? -
[ANSWER]: Look for h-t-t-p-s in the URL name
QUESTION: Which type of data could reasonably be expected to
cause damage to national security? -
[ANSWER]: Confidential
,QUESTION: How can you protect data on a mobile device? -
[ANSWER]: Use two-factor authentication
QUESTION: What is an insider threat? -
[ANSWER]: Someone who uses authorized access, either wittingly or
unwittingly, to harm national security.
QUESTION: Which of the following is an appropriate use of
government e-mail? -
[ANSWER]: Using a digital signature when sending hyperlinks
QUESTION: What is a best practice for creating user accounts for your
home computer? -
[ANSWER]: Create separate accounts for each user and have each user
create their own password
, QUESTION: Which of the following is NOT an appropriate use of
your Common Access Card (CAC)? -
[ANSWER]: Exchanging it for a visitor pass in another building
QUESTION: Does it pose a security risk to tap your smartwatch to pay
for a purchase at a store? -
[ANSWER]: Yes. There is a risk that the signal could be intercepted and
altered.
QUESTION: Which of the following is a potential insider threat
indicator? -
[ANSWER]: Death of a spouse
QUESTION: Which of the following is a best practice for protecting
your home wireless network for telework or remote work? -
[ANSWER]: Implement, as a minimum, Wi-Fi Protected Access 2
(WPA2) Personal encryption