CYBER AWARENESS TRAINING
FLASHCARDS
EXAM PREPARATION GUIDE | 25 ITEMS
Q:Does this action pose a potential security risk?
- Yes
- 3+
Q:E-mail storage quata exceeded: How many social engineering indicators are present in this e-mail?
Q:Which of the following must you do when using an unclassified laptop in a
collateral classified environment?
- Disable the embedded camera, microphone, and Wi-Fi- Use government-issued wired
peripherals
Q:Is this an appropriate use of government-furnished equipment (GFE)?
No Q:DOD Software shared: How many social engineering indicators are present in this e-mail? You are not expecting this e-mail
- 3+
Q:Your meeting notes are Unclassified. This means that your notes: Do not have the potential to damage national security
Q:Which action will keep DOD data the safest?
- Leave the coffee shop
Q:Select an action to take in response to compromised Sensitive Compartmented
Information (SCI) Call your security point of contact (POC)
Q:Which method of getting online poses the least risk?
- Approved mobile hotspot
Q:Which payment method poses the least risk?
- Cash
Q:How can malicious code spread? (Select all that apply)
- E-mail attachments- Downloading files- Visiting infected websites
Q:Which of the following poses a physical security risk?
Posting an access roster in public view
Q:The best way to keep your passport safe is to carry it with you
- False
Q:You should monitor your credit card statements for unauthorized purchases
- True
Q:Which of these individuals demonstrated behavior that could lead to the
compromise of SCI?COL Cockatiel Q:Personnel Roster: What type of information does this personnel roster represent?Controlled Unclassified Information (CUI)
Q:How can you prevent the download of malicious code? (Select all that apply)
- Scan external files before uploading to your device- Research apps and their vulnerabilities
before downloading
Q:This is not an appropriate use of GFE. Why?
- You should not use government e-mail to sell anything- You should use a digital signature
when sending hyperlinks- You should not use unauthorized services such as fileshare services, on GFE
Q:Which of the following must you do when working in a SCIF?
- Verify that all personnel in listening distance have a need-to-know- Ensure that monitors do
- A new app suddenly appears on the device- The device slows down- A new tab appears in
not provide unobstructed views- Escort uncleared personnel and warn others in the SCIF Q:Which of the following may indicate a malicious code attacks? (Select all that apply)
the web browser
Q:What step should be taken next to securely telework?
- Secure the area so others cannot view your monitor
- Encrypt the PII- Digitally sign the e-mail- Use your Government e-mail account
Q:Personnel Roster: When e-mailing this personnel roster, which of the following should you do?
Q:Which of these personally-owned computer peripherals may be used with
government-furnished equipment?
- HDMI monitor- USB keyboard
Q:You find an unlabeled thumb drive in the parking area outside your workplace.
What should you do?
- Turn it in to your security manager
Q:Voice-activated smart devices can collect and share your personal information
- True
CONFIDENTIAL EXAM MATERIAL | Page 3