DoD Annual TrainingAnswer Key

Which Function Do Insider Threat Programs Aim To Fulfill

39 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

you find information that you know to be classified on the internet what should you do?

ANSWER

Note the website URL and report the situation to your security point of contact

QUESTION 2

which of the following is ture of unclassified information?

ANSWER

it could affect the safety of government personnel, missions, and systems

QUESTION 3

which of the following is a security best practice for protecting personally identifiable information (PII) ?

ANSWER

Encrypt and digitally sign e-mails containing PII when sending them to non-Government accounts.

QUESTION 4

which designation marks information that does not have potential to damage national security?

ANSWER

Unclassified.

QUESTION 5

which of the following is NOT an example of CUI?

ANSWER

Press release data.

QUESTION 6

which of the following is NOT a correct way to protect CUI?

ANSWER

CUI may be stored on any password protected system.

QUESTION 7

which of the following is NOT a type of malicious code?

ANSWER

software that installs itself without the users knowledge.

QUESTION 8

which of the following is an example of malicious code?

ANSWER

all of these.

QUESTION 9

how can malicious code cause damage?

ANSWER

do not access website links in email messages.

QUESTION 10

how can you avoid downloading malicious code?

ANSWER

Exceptionally grave damage

QUESTION 11

which of the following is a good practice for telework?

ANSWER

you must have your organizations permission to telework.

QUESTION 12

what is the basis for the handling and storage of classified data?

ANSWER

classified material must be appropriately marked.

QUESTION 13

what level of damage to national security can you reasonably expect top secret information to cause if disclosed?

ANSWER

proactively identify potential threats and formulate holistic mitigation response.

QUESTION 14

which of the following is true about telework?

ANSWER

unusual interest in classified information.

QUESTION 15

which of the following is true of protecting classified data?

ANSWER

3 or more indicators.

QUESTION 16

what function do insider threat programs aim to fulfill?

ANSWER

???actively seek content that confirms the information???

QUESTION 17

which of the following is a potential insider threat indicator?

ANSWER

???deleting post containing personal information on a regular basis???

QUESTION 18

based on the description that follows, how many potential insider threat indicator(s) are displayed? a colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases and unusually expensive new car and has unexplained absences from work.

ANSWER

???actively engage in non professional and non routine contacts with foreign nationals.???

QUESTION 19

a trusted friend in your social network post a link to a vaccine information on a website known to you. what action should you take?

ANSWER

CPCON 1

QUESTION 20

ow can you protect yourself on social networking sites?

ANSWER

remove his CAC and lock his work station.

QUESTION 21

how can you protect your organization on social networking sites?

ANSWER

decline to let the person in and redirect her to security.

QUESTION 22

which cyber protection condition (CPCON) establishes a protection priority focus on critical functions only?

ANSWER

a common access card and personal identification number.

QUESTION 23

what should the employee do differently? Incident#1

ANSWER

you should remove and take you CAC/PIV card whenever you leave your workstation.

QUESTION 24

what should the employee do differently? Incident#2

ANSWER

Confirm the individuals need to know and access.

QUESTION 25

which of the following is an example of two- factor authentication?

ANSWER

the provide guidance on reasons for and duration of classification of information

QUESTION 26

which of the following is true of the (CAC) or (PIV) card?

ANSWER

(THIS IS A POTENTIAL) the one not on this list is the answer -SHUT DOWN OF SYSTEMS -COMPROMISE OF INFORMATION, SYSTEMS, PROGRAMS, AND/OR ASSETS -LOSS OF MISSION -LOSS OF LIFE

QUESTION 27

what must authorized personnel do before permitting another individual to enter a sensitive compartmented information facility? (SCIF)

ANSWER

only expressed authorized government owned PEDs.

QUESTION 28

which of the following is true of security classification guides?

ANSWER

all of these

QUESTION 29

which of the following is NOT a potential consequence of using removable media unsafely in a sensitive Compartmented information facility? (SCIF)

ANSWER

ANSWER IS NOT -by accepting cookies, you authorize websites to store your personal data on a web server.

QUESTION 30

what portable electronic device (PEDs) are permitted in SCIF?

ANSWER

investigate the destination by using the preview feature to see where the link actually leads.

QUESTION 31

what is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF?

ANSWER

you must update and validate your information.

QUESTION 32

which of the following statement is true of cookies?

ANSWER

they can be part of a distributed denial of service (DDoS) attack.

QUESTION 33

what action should you take with a compressed uniform resource locator (URL) on a website known to you

ANSWER

the physical security of the device.

QUESTION 34

what is a common indicator of phishing attempt?

ANSWER

ANSWER IS NOT - Digital video interface (DVI)

QUESTION 35

which of the following is true of internet hoaxes?

ANSWER

it may occur at any time without your knowledge or consent.

QUESTION 36

which of the following is a concern when using our government issued laptop in public?

ANSWER

enable automatic screen locking after a period of inactivity.

QUESTION 37

which of the following is NOT a permitted way to connect to personally-owned monitor to your goverment furnished equipment? (GFE)?

ANSWER

ITS NEVER OK!!!

QUESTION 38

Which of the following best describes the conditions under which mobile devices and applications can track your location?

ANSWER

Linda encrypts all of the sensitive data on her government-issued mobile device.

QUESTION 39

how can you protect data on your mobile computing and portable electronics device (PEDS)?

ANSWER

they can become an attack vector to other devices on your home network.

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials