DOD CYBER AWARENESS CHALLENGE 2019:
KNOWLEDGE CHECK FLASHCARDS
EXAM PREPARATION GUIDE | 21 ITEMS
Q:What should you do after you have ended a call from a reporter asking you to
confirm potentially classified info found on the web?Alert your security point of contact.
Q:Under what circumstances is it acceptable to check personal email on
Government-furnished equipment (GFE)?If your organization allows it.
Q:How can you protect your information when using wireless technology?
Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals.
Q:Which of these is true of unclassified data?
Its classification level may rise when aggregated.
Q:When checking in at the airline counter for a business trip...
Decline so that you maintain physical contact of your Government-issued laptop.
Q:How should you protect your Common Access Card (CAC) or Personal Identity
Verification (PIV) card?Store it in a shielded sleeve to avoid chip cloning.
Q:Which of the following is NOT a typical result from running malicious code?
Disables cookies.
Q:What kind of information could reasonably be expected to cause serious damage
to national security in the event of unauthorized disclosure?Top Secret
Q:Which of the following is true of Internet hoaxes?
They can be part of a distributed denial-of-service (DDoS) attack.
Q:What is the best protection method for sharing Personally Identifiable
Information (PII)?Digitally sign and encrypt the email.
Q:What type of information includes personal, payroll, medical, and operational
information?Sensitive.Q:Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?Connect to the Government Virtual Private Network (VPN).
Q:Which of the following statements is TRUE about the use of DoD Public Key
Infrastructure (PKI) tokens?Always use DoD PKI tokens within their designated classification level.Q:Which of the following is a practice that helps to protect you from identity theft?Ordering a credit report annually.
Q:A man you do not know is trying to look at your Government-issued phone and
has asked to use it. What should you do?Decline to lend the man your phone.
Q:When would be a good time to post your vacation location and dates on your
social networking website?When you return from your vacation.
Q:Which of the following is NOT considered a potential insider threat indicator?New interest in learning a foreign language.Q:Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email?Do not access links or hyperlinked media such as buttons and graphics in email messages.
Q:A colleague has visited several foreign countries recently...
. 2 indicators
Q:Which of the following describes an appropriate use of Government email?
Molly uses a digital signature when sending attachments or hyperlinks.Q:Which of the following actions is appropriate after finding classified Government information on the internet?Note any identifying information and the website's URL.
CONFIDENTIAL EXAM MATERIAL | Page 3