ANNUAL DOD CYBER AWARENESS
CHALLENGE TRAINING - 2019 KNOWLEDGE
CHECK QUESTIONS FLASHCARDS
EXAM PREPARATION GUIDE | 35 ITEMS
Q:A colleague complains about anxiety and exhaustion, makes coworkers
uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. How many potential insider threat indicators does this employee display??
Q:Select all security issues. Then select Submit. [Isabel/Website Use]
Top and bottom sections only
Q:Is it permitted to share an unclassified draft document with a non-DoD
professional discussion group?As long as the document is cleared for public release, you may share it outside of DoD.
Q:You receive an email from the Internal Revenue Service (IRS) demanding
immediate payment of back taxes of which you were not aware. The email provides a website and a toll-free number where you can make payment. What action should you take?Contact the IRS using their publicly available, official contact information.
Q:Which of the following is NOT true concerning a computer labeled SECRET?
May be used on an unclassified network
Q:How many insider threat indicators does Alex demonstrate?
Three or more
Q:What is the best way to protect your Common Access Card (CAC) or Personal
Identity Verification (PIV) card?Maintain possession of it at all times.
Q:Which of the following is a best practice for securing your home computer?
Use antivirus software and keep it up to date.Q:Which of the following should you NOT do if you find classified information on the internet?Download the information
Q:What do you do if spillage occurs?
?
Q:Which of the following represents a good physical security practice?
Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card.
Q:What information most likely presents a security risk on your personal social
networking profile?Personal email address Q:Select the appropriate setting for each item. Then select Save. [Alex Smith/Social Media] Name and profile picture - Any (depends on personal preference)Biographical data - Friends Only;Status, photos, and posts - Friends Only;Family and relationships - Friends Only;Birthday - Friends Only;Photos and videos you are in - Friends Only;Check in location via GPS - Off
Q:What kind of information could reasonably be expected to cause serious damage
to national security in the event of unauthorized disclosure?Secret
Q:Which email attachments are generally SAFE to open?
Attachments contained in a digitally signed email from someone known
Q:While you are waiting for your lunch bill, a stranger picks up your
Government-issued phone from your table and proceeds to exit the facility with it. What should you do?Try to observe the direction taken and any other useful information and immediately make a report to your security point of contact.
Q:Which of the following is a best practice for handling cookies?
?Q:In addition to avoiding the temptation of greed to betray his country, what should Alex do differently?Avoid talking about work outside of the workplace or with people without a need-to-know Q:After clicking on a link on a website, a box pops up and asks if you want to run an application. Is it okay to run it?No. Only allow mobile code to run from your organization or your organization's trusted sites.
Q:Which of the following is NOT true of traveling overseas with a mobile phone?
?
Q:Which of the following statements is TRUE about the use of DoD Public Key
Infrastructure (PKI) tokens?Always use DoD PKI tokens within their designated classification level.Q:Select all sections of the profile that contain an issue. Then select Submit. [Alex Smith] All three sections
Q:You receive an email at your official Government email address from an
individual at the Office of Personnel Management (OPM). The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. What action should you take first?Look for a digital signature on the email.Q:Which of the following is NOT an appropriate way to protect against inadvertent spillage?Use the classified network for all work, including unclassified work Q:Which type of information includes personal, payroll, medical, and operational information?Sensitive
Q:What information most likely presents a security risk on your personal social
networking profile??
Q:Which of the following does NOT constitute spillage?
Classified information that should be unclassified and is downgraded
Q:What should Alex's colleagues do?
Report the suspicious behavior in accordance with their organization's insider threat policy
Q:Which of the following should be reported as a potential security incident?
A coworker removes sensitive information without authorization.
Q:What is the danger of using public Wi-Fi connections?
Both of these Q:What advantages do "insider threats" have over others that allows them to be able to do extraordinary damage to their organizations?They are trusted and have authorized access to Government information systems.