CYBER AWARENESS 2025 FLASHCARDS
EXAM PREPARATION GUIDE | 23 ITEMS
Q:An authorized Goverment-owned Portable Electronic Device (PED)
As you scroll through your social media feed, a news headline catches your eye. What should you consider before sharing it with your connections?
Q:Report the e-mail to your security POC or help desk.
Which of the following is an allowed use of government furnished equipment (GFE)?
Q:Which of the following is true of transmitting or transporting Sensitive
Compartmented Information (SCI)?You must be courier-briefed for SCI to transport it.
Q:Whether the source is credible and reliable.
How can you prevent viruses and malicious code?Q:Badges must be worn while in the facility and removed when leaving the facility.Which of the following is an example of removable media?
Q:Connect to your Government private network (VPN)
Which of the following is permitted within a Sensitive Compartmented Information Facility
(SCIF)?
Q:Report suspicious activity.
Which of the following is true of working within a Sensitive Compartmented Information Facility (SCIF)?
Q:When linked to a specific individual, which of the following is NOT an example of Personally Identifiable Information (PII)?Smartphone brand and model
Q:How can you protect yourself from identity theft?
Review your credit report annually.
Q:How can you protect a mobile device while traveling?
Connect with a Government VPN.
Q:E-mailing your supervisor
John receives an e-mail about a potential shutdown of a major social service unless a petition receives enough signatures. Which of the following actions should John NOT take with the e-mail?
Q:How can you protect your home computer?
Use legitimate, known antivirus software.
Q:Which type of data could reasonably be expected to cause damage to national
security?Confidential
Q:Using a digital signature when sending hyperlinks
Which of the following is a best practice for physical security?Q:Which of the following is an appropriate use of a DoD Public Key Infrastructure (PKI) token?Only leave it in a system while actively using it for a PKI-required task.
Q:Scan all e-mail attachments
Which of the following is an allowed use of government furnished equipment (GFE)?
Q:How can you protect yourself on social networking sites?
Validate connection requests through another source if possible.
Q:Forward it
Which of the following is an appropriate use of government e-mail?
Q:Which of the following statements about Protected Health Information (PHI) is
true?It is the health information that identifies the individual
Q:equipment (GFE)?E-mailing your supervisorBased on the description provided,
how many insider threat indicators are present? Edward has worked for the DoD agency for 2 years. He is an analyst who takes a great deal of interest in his work.He occasionally takes a somewhat aggressive interest in others' work as well, including asking for classified details of their projects. He otherwise gets along well with his colleagues.3
Q:A wired keyboard connected via USB
Which of the following is a best practice for protecting your home wireless network for telework or remote work?Q:Which of the following would work in combination for two-factor authentication?Which of the following is a way to protect classified data?
Q:Which of the following is true of spillage?
You receive an e-mail with a link to run an anti-virus scan. Your IT department has not sent links like this in the past. The e-mail is not digitally signed. What action should you take?
CONFIDENTIAL EXAM MATERIAL | Page 3