DOD Cyber Awareness Challenge 2025 Knowledge check

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 49

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

50 Terms

1

Which of the following is true of compressed URLs (e.g., TinyURL, goo.gl)?

They may be used to mask malicious intent

New cards
2

What is a best practice for creating user accounts for your home computer?

Create separate accounts for each user and have each user create their own password.

New cards
3

Which of the following is a best practice to protect your identity?

Ask how information will be used before giving it out. (Correct)

Ref: Cyber Awareness Challenge 2025 / Identity Protection

New cards
4

John receives an e-mail about a potential shutdown of a major social service unless a petition receives enough signatures. Which of the following actions should John NOT take with the e-mail?

Forward it (Correct)

Ref: Cyber Awareness Challenge 2025 / Phishing

New cards
5

Which of the following is an appropriate use of government e-mail?

Using a digital signature when sending hyperlinks

New cards
6

Steve occasionally runs errands during virtual meetings. He joins the meetings using his approved government device. Does this pose a security concern?

Yes. Eavesdroppers may be listening to Steve's conversation

New cards
7

How can you prevent viruses and malicious code?

Scan all e-mail attachments (Correct)

Ref: Cyber Awareness Challenge 2025 / Protecting Against Malicious Code

New cards
8

Matt is a government employee who needs to share a document containing source selection data with his supervisor. Which of the following describes the most appropriate way for Matt to do this?

Encrypt it and send it via digitally signed Government e-mail. (Correct)

Ref: Cyber Awareness Challenge 2025 / Protecting PII/PHI

New cards
9

You receive an e-mail with a link to run an anti-virus scan. Your IT department has not sent links like this in the past. The e-mail is not digitally signed. What action should you take?

Report the e-mail to your security POC or help desk. (Correct)

Ref: Cyber Awareness Challenge 2025 / Phishing

New cards
10

Which of the following is a way to protect classified data?

Store it in a GSA-approved container

New cards
11

How can you protect yourself from identity theft?

Review your credit report annually

New cards
12

How can you protect your home computer?

Use legitimate, known antivirus software (Correct)

Install spyware protection software. (Correct)

Ref: Cyber Awareness Challenge 2025 / Best Practices for Home Computer Security

New cards
13

Which of the following poses a security risk while teleworking in an environment where Internet of Things (IoT) devices are present?

All of these.

New cards
14

Which of these is NOT a potential indicator that your device may be under a malicious code attack?

An operating system update (Correct)

Ref: Cyber Awareness Challenge 2025 / Incident Indicators

New cards
15

What are the requirements for access to Sensitive Compartmented Information (SCI)?

Top Secret clearance and indoctrination into the SCI program

New cards
16

Which of the following is an example of removable media?

Compact disc

New cards
17

Which of the following is an example of behavior that you should report?

Bringing a phone into a prohibited area

New cards
18

Which of the following is NOT an appropriate use of your Common Access Card (CAC)?

Exchanging it for a visitor pass in another building. (Correct)

Ref: Cyber Awareness Challenge 2025 / CAC/PIV Card Protection

New cards
19

You receive a phone call from an unknown person asking for a directory name on your government furnished laptop so that a software update can be made. Which course of action should you take?

Document the interaction and contact your security POC or help desk

New cards
20

How can you protect your home computer?

Install spyware protection software

New cards
21

Which of the following is an appropriate use of a DoD Public Key Infrastructure (PKI) token?

Only leave it in a system while actively using it for a PKI-required task

New cards
22

How can you protect yourself on social networking sites?

Validate connection requests through another source if possible. (Correct)

Ref: Cyber Awareness Challenge 2025 / Social Networking: Protect Yourself

New cards
23

How can you protect data on a mobile device?

Use two-factor authentication

New cards
24

You receive an e-mail marked important from your agency head asking you to call them using a number you do not recognize. The e-mail was sent from a personal e-mail address that you do not recognize, but it addresses you by name. What action should you take?

This may be a spear phishing attempt. Report it to your security POC or help desk.

New cards
25

Which of the following is permitted when using an unclassified laptop within a collateral classified space?

A personally-owned wired headset without a microphone (Correct)

Ref: Cyber Awareness Challenge 2025 / Collateral Classified Spaces

New cards
26

Tessa is processing payroll data that includes employees' names, home addresses, and salary. Which of the following is Tessa prohibited from doing with the data?

Using her home computer to print the data while working remotely. (Correct)

Ref: Cyber Awareness Challenge 2025 / Telework and Home Computer Security

New cards
27

Which type of data could reasonably be expected to cause damage to national security?

Secret

New cards
28

Which of the following is true of Sensitive Compartmented Information Facilities (SCIFs)?

SCIFs are not permitted to be constructed with windows unless fixed, unalterable window coverings are in place.

New cards
29

When allowed, which of the following is an appropriate use of removable media?

Labeling media that contains personally identifiable information (PII) (Correct)

Ref: Cyber Awareness Challenge 2025 / Appropriate Use of Removable Media

New cards
30

Which of the following is a potential Insider threat indicator?

Financial windfall from an inheritance

New cards
31

Which of the following is a best practice when browsing the Internet?

Look for h-t-t-p-s in the URL name

New cards
32

Which of the following would work in combination for tow-factor authentication?

Common Access Card (CAC) and Personal Identification Number (PIN)

New cards
33

Which of the following is a best practice for protecting your home wireless network for telework or remote work?

Implement, as a minimum, Wi-Fi Protected Access 2 (WPA2) Personal encryption.

New cards
34

Which of the following is true of removable media and portable electronic devices (PEDs)

Removable media pose more risks than PEDs and are not permitted in government facilities?

New cards
35

Which of the following statements about Protected Health Information (PHI) is true?

It refers to all health information, regardless of the source or recipient.

New cards
36

Does it pose a risk to tap your smartwatch to pay for a purchase at a store?

Only if you do not have two-factor authentication enables on your linked phone

New cards
37

Which of the following is an allowed use of government furnished equipment (GFE)?

E-mailing your supervisor

New cards
38

Based on the description provided, how many insider threat indicators are present? Edward has worked for the DoD agency for 2 years. He is an analyst who takes a great deal of interest in his work. He occasionally takes a somewhat aggressive interest in others' work as well, including asking for classified details of their projects. He otherwise gets along well with his colleagues.

1-2 (Unsure)

Ref: Cyber Awareness Challenge 2025 / Detecting Insider Threats

New cards
39

How can you protect a mobile device while traveling?

Connect with a Government VPN. (Correct)

Ref: Cyber Awareness Challenge 2025 / Traveling with Mobile Devices

New cards
40

What is an insider threat?

Someone who uses authorized access, either wittingly or unwittingly, to harm national security. (Correct)

Ref: Cyber Awareness Challenge 2025 / Insider Threat

New cards
41

Which of the following is a best practice for telework and remote work?

Connect to your Government Virtual Private Network (VPN) (Correct)

Ref: Cyber Awareness Challenge 2025 / Telework and Home Computer Security

New cards
42

Which of the following is true of spillage?

It can be inadvertent or intentional. (Correct)

Ref: Cyber Awareness Challenge 2025 / Spillage

New cards
43

Which of the following would work in combination for two-factor authentication?

Common Access Card (CAC) and Personal Identification Number (PIN) (Correct)

Ref: Cyber Awareness Challenge 2025 / Identity Authentication

New cards
44

Under which Cyberspace Protection Condition (CAPCON) is the priority focus limited to critical functions?

CPCON 1 (Correct)

Ref: Cyber Awareness Challenge 2025 / Cyberspace Protection Conditions (CPCON)

New cards
45

Which of the following is true of working within a Sensitive Compartmented Information Facility (SCIF)?

Badges must be worn while in the facility and removed when leaving the facility. (Correct)

Ref: Cyber Awareness Challenge 2025 / Sensitive Compartmented Information Facilities (SCIFs)

New cards
46

When linked to a specific individual, which of the following is NOT an example of Personally Identifiable Information (PII)?

Smartphone brand and model (Correct)

Ref: Cyber Awareness Challenge 2025 / Personally Identifiable Information (PII)

New cards
47

Which is an example of a strong password?

bRobr@79I*P (Correct)

Ref: Cyber Awareness Challenge 2025 / Passwords

New cards
48

Which of the following describes Sensitive Compartmented Information (SCI)?

SCI introduces an overlay of security to Top Secret, Secret, and Confidential information. (Correct)

Ref: Cyber Awareness Challenge 2025 / Sensitive Compartmented Information (SCI)

New cards
49

When is the safest time to post on social media about your work-related travel?

After the trip (Correct)

Ref: Common Sense

New cards
50

As you browse a social media site, you come across photos of information with classified markings. What should you do?

Notify your security point of contact. (Correct)

Ref: Cyber Awareness Challenge 2025 / Responding to Spillage

New cards

Explore top notes

note Note
studied byStudied by 18 people
904 days ago
5.0(1)
note Note
studied byStudied by 66 people
932 days ago
5.0(1)
note Note
studied byStudied by 7 people
913 days ago
5.0(1)
note Note
studied byStudied by 50 people
959 days ago
5.0(2)
note Note
studied byStudied by 20 people
904 days ago
5.0(1)
note Note
studied byStudied by 20 people
1012 days ago
4.5(2)
note Note
studied byStudied by 52 people
48 days ago
5.0(3)
note Note
studied byStudied by 84 people
758 days ago
5.0(3)

Explore top flashcards

flashcards Flashcard (126)
studied byStudied by 9 people
703 days ago
5.0(1)
flashcards Flashcard (58)
studied byStudied by 9 people
661 days ago
4.0(1)
flashcards Flashcard (60)
studied byStudied by 713 people
344 days ago
4.0(4)
flashcards Flashcard (37)
studied byStudied by 3 people
337 days ago
5.0(1)
flashcards Flashcard (140)
studied byStudied by 1 person
87 days ago
5.0(1)
flashcards Flashcard (28)
studied byStudied by 4 people
37 days ago
5.0(1)
flashcards Flashcard (23)
studied byStudied by 4 people
780 days ago
5.0(1)
flashcards Flashcard (275)
studied byStudied by 120 people
3 days ago
5.0(3)
robot