DoD Annual TrainingAnswer Key

Marty Cyber Awareness

34 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

What do you do if spillage occurs?

ANSWER

?

QUESTION 2

Which of the following does NOT constitute spillage?

ANSWER

Classified information that should be unclassified and is downgraded

QUESTION 3

Which of the following is NOT an appropriate way to protect against inadvertent spillage?

ANSWER

Use the classified network for all work, including unclassified work

QUESTION 4

Which of the following should you NOT do if you find classified information on the internet?

ANSWER

Download the information

QUESTION 5

Which of the following is NOT true concerning a computer labeled SECRET?

ANSWER

May be used on an unclassified network

QUESTION 6

What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure?

ANSWER

Secret

QUESTION 7

What advantages do "insider threats" have over others that allows them to be able to do extraordinary damage to their organizations?

ANSWER

They are trusted and have authorized access to Government information systems.

QUESTION 8

Which of the following should be reported as a potential security incident?

ANSWER

A coworker removes sensitive information without authorization.

QUESTION 9

A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. How many potential insider threat indicators does this employee display?

ANSWER

?

QUESTION 10

In addition to avoiding the temptation of greed to betray his country, what should Alex do differently?

ANSWER

Avoid talking about work outside of the workplace or with people without a need-to-know

QUESTION 11

How many insider threat indicators does Alex demonstrate?

ANSWER

Three or more

QUESTION 12

What should Alex's colleagues do?

ANSWER

Report the suspicious behavior in accordance with their organization's insider threat policy

QUESTION 13

What information most likely presents a security risk on your personal social networking profile?

ANSWER

Personal email address

QUESTION 14

Select all sections of the profile that contain an issue. Then select Submit. [Alex Smith]

ANSWER

All three sections

QUESTION 15

Select the appropriate setting for each item. Then select Save. [Alex Smith/Social Media]

ANSWER

Name and profile picture - Any (depends on personal preference) Biographical data - Friends Only; Status, photos, and posts - Friends Only; Family and relationships - Friends Only; Birthday - Friends Only; Photos and videos you are in - Friends Only; Check in location via GPS - Off

QUESTION 16

Which of the following is NOT a correct way to protect sensitive information?

ANSWER

Sensitive information may be stored on any password-protected system.

QUESTION 17

Is it permitted to share an unclassified draft document with a non-DoD professional discussion group?

ANSWER

As long as the document is cleared for public release, you may share it outside of DoD.

QUESTION 18

Which type of information includes personal, payroll, medical, and operational information?

ANSWER

Sensitive

QUESTION 19

After clicking on a link on a website, a box pops up and asks if you want to run an application. Is it okay to run it?

ANSWER

No. Only allow mobile code to run from your organization or your organization's trusted sites.

QUESTION 20

Which of the following represents a good physical security practice?

ANSWER

Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card.

QUESTION 21

Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens?

ANSWER

Always use DoD PKI tokens within their designated classification level.

QUESTION 22

What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card?

ANSWER

Maintain possession of it at all times.

QUESTION 23

Which of the following is a best practice for handling cookies?

ANSWER

?

QUESTION 24

Select all security issues. Then select Submit. [Isabel/Website Use]

ANSWER

Top and bottom sections only

QUESTION 25

You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. What action should you take first?

ANSWER

Look for a digital signature on the email.

QUESTION 26

You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. The email provides a website and a toll-free number where you can make payment. What action should you take?

ANSWER

Contact the IRS using their publicly available, official contact information.

QUESTION 27

Which email attachments are generally SAFE to open?

ANSWER

Attachments contained in a digitally signed email from someone known

QUESTION 28

Which of the following is NOT true of traveling overseas with a mobile phone?

ANSWER

?

QUESTION 29

What should Sara do when using publicly available Internet, such as hotel Wi-Fi?

ANSWER

Only connect with the Government VPN

QUESTION 30

What is the danger of using public Wi-Fi connections?

ANSWER

Both of these

QUESTION 31

A coworker has asked if you want to download a programmer's game to play at work. What should be your response?

ANSWER

I'll pass.

QUESTION 32

While you are waiting for your lunch bill, a stranger picks up your Government-issued phone from your table and proceeds to exit the facility with it. What should you do?

ANSWER

Try to observe the direction taken and any other useful information and immediately make a report to your security point of contact.

QUESTION 33

Mobile devices include fitness bands, tablets, smartphones, electronic readers, and Bluetooth- enabled devices.

ANSWER

True

QUESTION 34

Which of the following is a best practice for securing your home computer?

ANSWER

Use antivirus software and keep it up to date.

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials