DoD Annual TrainingAnswer Key

Not Considered A Potential Insider Threat Indicator

23 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Which of these is true of unclassified data?

ANSWER

-It must be released to the public immediately. -Its classification level may rise when aggregated. (Correct) -It does not affect the safety of Government missions. -It never requires classification markings.

QUESTION 2

Which type of information includes personal, payroll, medical, and operational information?

ANSWER

Sensitive

QUESTION 3

Which of the following is NOT a correct way to protect sensitive information?

ANSWER

Sensitive information may be stored on any password-protected system.

QUESTION 4

Which of the following is NOT a typical result from running malicious code?

ANSWER

Disabling cookies

QUESTION 5

What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred?

ANSWER

Exceptionally grave damage

QUESTION 6

Which of the following is true about telework?

ANSWER

You must have your organization's permission to telework.

QUESTION 7

Which of following is true of protecting classified data?

ANSWER

Classified material must be appropriately marked.

QUESTION 8

Which of the following is NOT considered a potential insider threat indicator?

ANSWER

New interest in learning another language?

QUESTION 9

A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. How many indicators does this employee display?

ANSWER

3 or more?

QUESTION 10

What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited?

ANSWER

Decline the request.

QUESTION 11

What information most likely presents a security risk on your personal social networking profile?

ANSWER

Birthplace

QUESTION 12

You have reached the office door to exit your controlled area. As a security best practice, what should you do before exiting?

ANSWER

Remove your security badge, common access card (CAC), or personal identity verification (PIV) card.

QUESTION 13

How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card?

ANSWER

Store it in a shielded sleeve to avoid chip cloning.

QUESTION 14

Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens?

ANSWER

Always use DoD PKI tokens within their designated classification level.

QUESTION 15

Which of the following is a best practice for handling cookies?

ANSWER

If possible, set your browser preferences to prompt you each time a website wants to store a cookie.

QUESTION 16

You receive an unexpected email from a friend: "I think you'll like this: (URL)" What action should you take?

ANSWER

Use TinyURL's preview feature to investigate where the link leads.

QUESTION 17

You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. What action should you take first?

ANSWER

Look for a digital signature on the email.

QUESTION 18

What is TRUE of a phishing attack?

ANSWER

Phishing can be an email with a hyperlink as bait.

QUESTION 19

Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?

ANSWER

Connect to the Government Virtual Private Network (VPN).??

QUESTION 20

A coworker has asked if you want to download a programmer's game to play at work. What should be your response?

ANSWER

I'll pass.

QUESTION 21

A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. What should you do?

ANSWER

Never allow sensitive data on non-Government-issued mobile devices.

QUESTION 22

Which of the following demonstrates proper protection of mobile devices?

ANSWER

Linda encrypts all of the sensitive data on her government-issued mobile devices.

QUESTION 23

How can you protect your information when using wireless technology?

ANSWER

Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals.

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials