DoD Annual TrainingAnswer Key

Cyber Awareness Challenge 2022 Certificate

29 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

SPILLAGE Which of the following may be helpful to prevent spillage?

ANSWER

Label all files, removable media, and subject headers with appropriate classification markings.

QUESTION 2

CLASSIFIED DATA Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization?

ANSWER

Secret

QUESTION 3

CLASSIFIED DATA What is a good practice to protect classified information?

ANSWER

Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material.

QUESTION 4

INSIDER THREAT Based on the description below how many potential insider threat indicators are present? A colleague often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display?

ANSWER

3 or more indicators

QUESTION 5

INSIDER THREAT What threat do insiders with authorized access to information or information systems pose?

ANSWER

They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities.

QUESTION 6

INSIDER THREAT Which of the following is NOT considered a potential insider threat indicator?

ANSWER

New interest in learning a foregin language.

QUESTION 7

SOCIAL NETWORKING When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct?

ANSWER

If you participate in or condone it at any time.

QUESTION 8

SOCIAL NETWORKING When is the safest time to post details of your vacation activities on your social networking profile?

ANSWER

After you have returned home following the vacation.

QUESTION 9

SOCIAL NETWORKING Which of the following is a security best practice when using social networking sites?

ANSWER

Understanding and using the available privacy settings.

QUESTION 10

UNCONTROLLED CLASSIFIED INFORMATION Which of the following is NOT an example of CUI?

ANSWER

Press release data

QUESTION 11

UNCONTROLLED CLASSIFIED INFORMATION Which of the following is NOT a correct way to protect CUI?

ANSWER

Sensitive information may be stored on any password-protected system.

QUESTION 12

Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI)

ANSWER

Jane Jones Social security number: 123-45-6789

QUESTION 13

Select the information on the data sheet that is protected health information (PHI)

ANSWER

Jane has been Dr...ect patient..ect.

QUESTION 14

PHYSICAL SECURITY Within a secure area, you see an individual who you do not know and is not wearing a visible badge

ANSWER

Ask the individual to see an identification badge.

QUESTION 15

IDENTITY MANAGEMENT What certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) card contain?

ANSWER

Identification, encryption, and digital signature

QUESTION 16

IDENTITY MANAGEMENT Which of the following is an example of a strong password?

ANSWER

eA1xy2!P

QUESTION 17

SENSITIVE COMPARTMENTED INFORMATION When faxing Sensitive Compartmented Information (SCI), what actions should you take?

ANSWER

Mark SCI documents appropriately and use an approved SCI fax machine.

QUESTION 18

SENSITIVE COMPARTMENTED INFORMATION When is it appropriate to have your security badge visible within a sensitive compartmented information facility (SCIF)?

ANSWER

At all times while in the facility.

QUESTION 19

REMOVABLE MEDIA IN A SCIF What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)?

ANSWER

Identify and disclose it with local Configuration/Change Management Control and Property Management authorities

QUESTION 20

MALICIOUS CODE Which of the following is NOT a way malicious code spreads?

ANSWER

Legitimate software updates

QUESTION 21

WEBSITE USE Which of the following statements is true of cookies?

ANSWER

You should only accept cookies from reputable, trusted websites.

QUESTION 22

SOCIAL ENGINEERING How can you protect yourself from internet hoaxes?

ANSWER

Use online sites to confirm or expose potential hoaxes

QUESTION 23

SOCIAL ENGINEERING How can you protect yourself from social engineering?

ANSWER

Follow instructions given only by verified personnel

QUESTION 24

SOCIAL ENGINEERING What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)?

ANSWER

Investigate the link's actual destination using the preview feature

QUESTION 25

TRAVEL Which of the following is a concern when using your Government-issued laptop in public?

ANSWER

Others may be able to view your screen.

QUESTION 26

USE OF GFE What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)?

ANSWER

Determine if the software or service is authorized

QUESTION 27

MOBILE DEVICES Which of the following is an example of near field communication (NFC)?

ANSWER

A smartphone that transmits credit card payment information when held in proximity to a credit card reader.

QUESTION 28

MOBILE DEVICES Which of the following is an example of removable media?

ANSWER

Flash Drive

QUESTION 29

HOME COMPUTER SECURITY Which of the following is a best practice for securing your home computer?

ANSWER

Create separate accounts for each user.

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials