DoD Annual TrainingComprehensive Study Set

What Guidance Is Available For Marking Sci Cyber Awareness

90 questions across 17 topics. Use the find bar or section chips to jump to what you need.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
SpillageQUESTION 1

After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. You know that this project is classified. How should you respond?

ANSWER

Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity

SpillageQUESTION 2

Which of the following may help to prevent spillage?

ANSWER

Label all files, removable media, and subject headers with appropriate classification markings.

SpillageQUESTION 3

A user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. What is the best choice to describe what has occurred?

ANSWER

Spillage because classified data was moved to a lower classification level system without authorization.

SpillageQUESTION 4

What should you do when you are working on an unclassified system and receive an email with a classified attachment?

ANSWER

Call your security point of contact immediately

SpillageQUESTION 5

What should you do if a reporter asks you about potentially classified information on the web?

ANSWER

Refer the reporter to your organization's public affairs office.

SpillageQUESTION 6

What should you do if you suspect spillage has occurred?

ANSWER

Immediately notify your security point of contact

SpillageQUESTION 7

Which of the following is a good practice to prevent spillage?

ANSWER

Be aware of classification markings and all handling caveats.

SpillageQUESTION 8

Which of the following actions is appropriate after finding classified information on the Internet?

ANSWER

Note any identifying information and the website's Uniform Resource Locator (URL)

Classified DataQUESTION 9

When classified data is not in use, how can you protect it?

ANSWER

Store classified data appropriately in a GSA-approved vault/container.

Classified DataQUESTION 10

What is required for an individual to access classified data?

ANSWER

Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know

Classified DataQUESTION 11

Which classification level is given to information that could reasonably be expected to cause serious damage to national security?

ANSWER

Secret

Classified DataQUESTION 12

Which of the following is a good practice to protect classified information?

ANSWER

Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material

Classified DataQUESTION 13

Which of the following is true of protecting classified data?

ANSWER

Classified material must be appropriately marked.

Classified DataQUESTION 14

What level of damage can the unauthorized disclosure of information classified as Confidential reasonably be expected to cause?

ANSWER

Damage to national security

Classified DataQUESTION 15

Which of the following is true of telework?

ANSWER

You must have permission from your organization.

Classified DataQUESTION 16

Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization?

ANSWER

Secret

Classified DataQUESTION 17

How should you protect a printed classified document when it is not in use?

ANSWER

Store it in a General Services Administration (GSA)-approved vault or container

Insider ThreatQUESTION 18

Based on the description that follows, how many potential insider threat indicator(s) are displayed? A colleague vacations at the beach every year, is married and a father of four, sometimes has poor work quality, and works well with his team.

ANSWER

~0 indicator

Insider ThreatQUESTION 19

How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display?

ANSWER

3 or more indicators

Insider ThreatQUESTION 20

Based on the description that follows, how many potential insider threat indicator(s) are displayed? A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information.

ANSWER

1 indicator

Insider ThreatQUESTION 21

What advantages do "insider threats" have over others that allows them to cause damage to their organizations more easily?

ANSWER

Insiders are given a level of trust and have authorized access to Government information systems

Insider ThreatQUESTION 22

What type of activity or behavior should be reported as a potential insider threat?

ANSWER

Coworker making consistent statements indicative of hostility or anger toward the United States in its policies.

Insider ThreatQUESTION 23

Which of the following should be reported as a potential security incident?

ANSWER

A coworker removes sensitive information without authorization

Insider ThreatQUESTION 24

Which scenario might indicate a reportable insider threat?

ANSWER

A coworker uses a personal electronic device in a secure area where their use is prohibited.

Insider ThreatQUESTION 25

Based on the description that follows, how many potential insider threat indicator(s) are displayed? A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion.

ANSWER

3 or more indicators

Insider ThreatQUESTION 26

Which type of behavior should you report as a potential insider threat?

ANSWER

Hostility or anger toward the United States and its policies

Insider ThreatQUESTION 27

Which of the following is NOT considered a potential insider threat indicator?

ANSWER

Treated mental health issues

Insider ThreatQUESTION 28

What do insiders with authorized access to information or information systems pose?

ANSWER

After you have returned home following the vacation

Social NetworkingQUESTION 29

When is the safest time to post details of your vacation activities on your social networking profile?

ANSWER

Decline the request

Social NetworkingQUESTION 30

What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sites visited?

ANSWER

Pictures of your pet Your birthday Your hobbies ~Your personal e-mail address

Social NetworkingQUESTION 31

Which of the following information is a security risk when posted publicly on your social networking profile?

ANSWER

Research the source of the article to evaluate its credibility and reliability

Social NetworkingQUESTION 32

Which of the following is a security best practice when using social networking sites?

ANSWER

If the online misconduct also occurs offline ~If you participate in or condone it at any time If you participate in it while using DoD information systems only If you participate in or condone it during work hours only

Social NetworkingQUESTION 33

When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct?

ANSWER

Use only your personal contact information when establishing your account

Social NetworkingQUESTION 34

Your cousin posted a link to an article with an incendiary headline on social media. What action should you take?

ANSWER

Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you.

Social NetworkingQUESTION 35

Which of the following best describes the sources that contribute to your online identity?

ANSWER

Inform your security point of contact

Social NetworkingQUESTION 36

As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project?

ANSWER

Press release data

Controlled Unclassified InformationQUESTION 37

Which of the following is NOT an example of CUI?

ANSWER

CUI may be stored on any password-protected system.

Controlled Unclassified InformationQUESTION 38

Which of the following is NOT a correct way to protect CUI?

ANSWER

Challenge people without proper badges.

Physical SecurityQUESTION 39

What is a good practice for physical security?

ANSWER

CPCON 1

Physical SecurityQUESTION 40

At which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only?

ANSWER

CPCON 2

Physical SecurityQUESTION 41

Which Cyber Protection Condition (CPCON) is the priority focus on critical and essential functions only?

ANSWER

Ask the individual for identification

Physical SecurityQUESTION 42

Within a secure area, you see an individual who you do not know and is not wearing a visible badge. What should you do?

ANSWER

On a NIPRNet system while using it for a PKI-required task

Identity ManagementQUESTION 43

Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. In which situation below are you permitted to use your PKI token?

ANSWER

Something you possess, like a CAC, and something you know, like a PIN or password

Identity ManagementQUESTION 44

Which of the following is the nest description of two-factor authentication?

ANSWER

Use a common password for all your system and application logons.

Identity managementQUESTION 45

Which is NOT a sufficient way to protect your identity?

ANSWER

Maintain possession of it at all times.

Identity managementQUESTION 46

What is the best way to protect your Common Access Card (CAC)?

ANSWER

Write your password down on a device that only you access (e.g., your smartphone)

Identity managementQUESTION 47

Which of the following is NOT a best practice to preserve the authenticity of your identity?

ANSWER

Your password and a code you receive via text message

Identity managementQUESTION 48

Which of the following is an example of two-factor authentication?

ANSWER

eA1xy2!P

Identity managementQUESTION 49

Which of the following is an example of a strong password?

ANSWER

A program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control

Sensitive Compartmented InformationQUESTION 50

What is Sensitive Compartmented Information (SCI)?

ANSWER

A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner.

Sensitive Compartmented InformationQUESTION 51

Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)?

ANSWER

~All documents should be appropriately marked, regardless of format, sensitivity, or classification. Unclassified documents do not need to be marked as a SCIF. Only paper documents that are in open storage need to be marked.

Sensitive Compartmented InformationQUESTION 52

When should documents be marked within a Sensitive Compartmented Information Facility (SCIF)

ANSWER

Security Classification Guide (SCG)

Sensitive Compartmented InformationQUESTION 53

Which must be approved and signed by a cognizant Original Classification Authority (OCA)?

ANSWER

Directives issued by the Director of National Intelligence

Sensitive Compartmented InformationQUESTION 54

What must the dissemination of information regarding intelligence sources, methods, or activities follow?

ANSWER

At all times when in the facility

Sensitive Compartmented InformationQUESTION 55

When is it appropriate to have your security badge visible?

ANSWER

Retrieve classified documents promptly from printers

Sensitive Compartmented InformationQUESTION 56

What should the owner of this printed SCI do differently?

ANSWER

Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed

Sensitive Compartmented InformationQUESTION 57

What should the participants in this conversation involving SCI do differently?

ANSWER

Mark SCI documents appropriately and use an approved SCI fax machine

Sensitive Compartmented InformationQUESTION 58

When faxing Sensitive Compartmented Information (SCI), what actions should you take?

ANSWER

Evaluate the causes of the compromise E-mail detailed information about the incident to your security point of contact (Wrong) Assess the amount of damage that could be caused by the compromise ~Contact your security point of contact to report the incident

Sensitive Compartmented InformationQUESTION 59

What action should you take if you become aware that Sensitive Compartmented Information (SCI) has been compromised?

ANSWER

Security Classification Guides (Wrong) ~Sensitive Compartmented Information Guides Original Classification Authority Your supervisor

Sensitive Compartmented InformationQUESTION 60

What guidance is available for marking Sensitive Compartmented Information (SCI)?

ANSWER

It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number.

Removable Media in a SCIFQUESTION 61

What must users ensure when using removable media such as compact disk (CD)?

ANSWER

Government-owned PEDs when expressly authorized by your agency

Removable Media in a SCIFQUESTION 62

What portable electronic devices (PEDs) are allowed in a Sensitive Compartmented Information Facility (SCIF)?

ANSWER

Identify and disclose it with local Configuration/Change Management Control and Property Management authorities

Removable Media in a SCIFQUESTION 63

What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)?

ANSWER

Viruses, Trojan horses, or worms

Malicious CodeQUESTION 64

What are some examples of malicious code?

ANSWER

Legitimate software updates

Malicious CodeQUESTION 65

Which of the following is NOT a way that malicious code spreads?

ANSWER

No, you should only allow mobile code to run from your organization or your organization's trusted sites.

Malicious CodeQUESTION 66

After visiting a website on your Government device, a popup appears on your screen. The popup asks if you want to run an application. Is this safe?

ANSWER

Since the URL does not start with "https," do not provide you credit card information.

Website UseQUESTION 67

While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. The website requires a credit card for registration. What should you do?

ANSWER

Report the crime to local law enforcement

Website UseQUESTION 68

How should you respond to the theft of your identity?

ANSWER

You should only accept cookies from reputable, trusted websites.

Website UseQUESTION 69

Which of the following statements is true of cookies?

ANSWER

Do not access website links, buttons, or graphics in e-mail

Social EngineeringQUESTION 70

Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail?

ANSWER

Phishing can be an email with a hyperlink as bait.

Social EngineeringQUESTION 71

What is TRUE of a phishing attack?

ANSWER

Follow instructions given only by verified personnel.

Social EngineeringQUESTION 72

Which of the following is a way to protect against social engineering?

ANSWER

A type of phishing targeted at senior officials

Social EngineeringQUESTION 73

What is whaling?

ANSWER

Investigate the link's actual destination using the preview feature

Social EngineeringQUESTION 74

What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)?

ANSWER

Use online sites to confirm or expose potential hoaxes

Social EngineeringQUESTION 75

How can you protect yourself from internet hoaxes?

ANSWER

They may be used to mask malicious intent.

Social EngineeringQUESTION 76

Which may be a security issue with compressed Uniform Resource Locators (URLs)?

ANSWER

A threat of dire consequence

Social EngineeringQUESTION 77

What is a common indicator of a phishing attempt?

ANSWER

Maintain possession of your laptop and other government-furnished equipment (GFE) at all times.

TravelQUESTION 78

What is a best practice while traveling with mobile computing devices?

ANSWER

It may be compromised as soon as you exit the plane.

TravelQUESTION 79

Which of the following is true of traveling overseas with a mobile phone?

ANSWER

It may expose the connected device to malware.

TravelQUESTION 80

What security risk does a public Wi-Fi connection pose?

ANSWER

Others may be able to view your screen.

TravelQUESTION 81

Which of the following is a concern when using your Government-issued laptop in public?

ANSWER

If allowed by organizational policy

Use of GFEQUESTION 82

When can you check personal e-mail on your Government-furnished equipment (GFE)?

ANSWER

Determine if the software or service is authorized

Use of GFEQUESTION 83

What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)?

ANSWER

Do not use any personally owned/non-organizational removable media on your organization's systems.

Mobile DevicesQUESTION 84

Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems?

ANSWER

Secure it to the same level as Government-issued systems

Mobile DevicesQUESTION 85

What can help to protect the data on your personal mobile device?

ANSWER

Maintain visual or physical control of the device

Mobile DevicesQUESTION 86

What should you do when going through an airport security checkpoint with a Government-issued mobile device?

ANSWER

When operationally necessary, owned by your organization, and approved by the appropriate authority

Mobile DevicesQUESTION 87

When can you use removable media on a Government system?

ANSWER

Flash drive

Mobile DevicesQUESTION 88

Which of the following is an example of removable media?

ANSWER

Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals.

Home Computer SecurityQUESTION 89

How can you protect your information when using wireless technology?

ANSWER

Reviewing and configuring the available security features, including encryption

Home Computer SecurityQUESTION 90

What should you consider when using a wireless keyboard with your home computer?

ANSWER

Create separate accounts for each user

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials