CYBER AWARENESS 2026 FLASHCARDS
EXAM PREPARATION GUIDE | 26 ITEMS
Q:Which of the following is an example of Protected Health Information (PHI)?
An individual's medical record maintained by a healthcare provider
Q:How can you take back any content you post to a social networking site if you
change your mind?Deleted the post.You can't. Once you post it, the site owns your content.Send a request to the site owner to purge your profile data.Disable your site account.
Q:What is a risk to Government systems posed by removable media?
Their data storage and ability to connect to systems can lead to unintended transfers of information, such as introduction of malicious code or spillage.Q:Which of the following is a best practice for working offsite during official travel?Position your monitor so that it is not easily observed by others while in use.Q:Which of the following is an example of an individual's activity that you should report?Changing workplace behavior abruptly
Q:Based on the description provided, how many insider threat indicators are
present? Jean is a long-term government employee who recently transferred from one agency to another to take a supervisory role. As part of her transition, Jean requires a high level of access to sensitive information.
Q:What is a best practice for user accounts on your home computer?
Each user should have their own account.
Q:Trisha receives an e-mail with a sensational rumor about a celebrity's personal life. Which of the following actions should Trisha NOT take with the e-mail?Forward it Q:You receive an e-mail with a link to verify that your account is active. It says you must click the link within 2 days. Your IT department has not sent links like this in the past. The e-mail is not digitally signed. What action should you take?Report the e-mail to your security POC or help desk
Q:Which of the following is an example of a Personally Identifiable Information
(PII)?
Mother's maiden name Q:Delia processes healthcare claims for Service members. As part of her duties, she sometimes needs to telephone team members and partner organizations to resolve issues specific to individual claims. As she often needs to access files and take notes on these calls, she prefers to use speakerphone so that her hands are free.She works on-site at a government facility in an open office environment. Does this pose a security concern?Yes. Even in a closed work environment, Delia should take care when discussing personally identifiable information (PII) where others without a need-to-know may overhear.
Q:How can you prevent spillage?
Label all files with appropriate classification markings.
Q:How can you identify the separation of Sensitive Compartmented Information
(SCI) classified materials from collateral classified material?SCI classified material and collateral classified material are in indistinguishable.Q:Which of the following is an allowed use of a government-furnished smartphone?Responding to e-mails on your government e-mail account
Q:Which of the following personally owned peripherals can you use with
government furnished equipment (GFE)?Wired keyboards, mice, and trackballs through a USB connections
Q:What should you do with your badge within a Sensitive Compartmented
Information Facility (SCIF) Wear is visibly and above the waist.
Q:Oliver uses his phone to look up information about a jacket he might want to
purchase. Later, he notices ads for the jacket appearing on websites that he views using his laptop. Why would he see this happen?Oliver's apps and devices collect and share information about him.
Q:Which of the following e-mail practices can help to prevent inadvertently
downloading viruses?Look for a digital signature on e-mails Q:While at your workstation, you hear an unusual sound coming from the direction of the office door. Before you go to check on the noise, what must you do?Remove your common Access Card (CAC) from your workstation.Q:While picking up lunch at a cafe, Thom waits for his order at an empty table near the pickup counter. When his name is called, he gets up to retrieve his order, briefly leaving his phone setting on the table where he was waiting. Does this pose a risk?Yes. Someone could have taken off with his phone.
Q:Which of the following is a potential insider threat indicator?
Untreated alcohol use disorder
Q:Which of the following is a best practice for physical security?
Badge into your facility separately when entering with another coworker
Q:What consequence could you expect from modifying government equipment
without authorization?Legal repercussionsIntroduction of malware to the networkIncreasing the potential for spillage*All of these
Q:Travis is processing travel reimbursements for the past quarter and needs to
share travel rosters containing passport numbers with his supervisor for approval. Which is an approved way to transmit this information?Encrypted Government e-mail with a digital signature
Q:Which of the following is an example of Protected Health Information (PHI)?
An individual's medical record maintained by a healthcare provider.Q:Oscar is on official Government travel with a Government-issues laptop. While at the airport, he uses the laptop to work on a report containing controlled unclassified information (CUI). For connectivity, he uses his personal phone as a mobile hotspot. Are there any security concerns here?Yes. He should be vigilant got "shoulder surfing," where others may be able to view the information on his screen.