Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

DOD Cyber Awareness Challenge 2025 Knowledge check Exam| A+ Rated| Already Passed| Guarant, Exams of Military Strategy and Training

DOD Cyber Awareness Challenge 2025 Knowledge check Exam| A+ Rated| Already Passed| Guaranteed success Which of the following is true of compressed URLs (e.g., TinyURL, goo.gl)? They may be used to mask malicious intent What is a best practice for creating user accounts for your home computer? Create separate accounts for each user and have each user create their own password. Which of the following is a best practice to protect your identity? Ask how information will be used before giving it out. (Correct) Ref: Cyber Awareness Challenge 2025 / Identity Protection John receives an e-mail about a potential shutdown of a major social service unless a petition receives enough signatures. Which of the following actions should John NOT take with the e-mail? Which of the following is an appropriate use of government e-mail? Steve occasionally runs errands during virtual meetings. He joins the meetings using his approved government device. Does this pose a security concern?

Typology: Exams

2024/2025

Available from 05/29/2025

paul-marks
paul-marks 🇺🇸

3.7

(32)

1.4K documents

1 / 13

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
pf3
pf4
pf5
pf8
pf9
pfa
pfd

Partial preview of the text

Download DOD Cyber Awareness Challenge 2025 Knowledge check Exam| A+ Rated| Already Passed| Guarant and more Exams Military Strategy and Training in PDF only on Docsity!

Which of the following is true of compressed URLs (e.g., TinyURL, goo.gl)? What is a best practice for creating user accounts for your home computer? Which of the following is a best practice to protect your identity? Ask how information will be used before giving it out. (Correct) Ref: Cyber Awareness Challenge 2025 / Identity Protection John receives an e-mail about a potential shutdown of a major social service unless a petition receives enough signatures. Which of the following actions should John NOT take with the e-mail? Ref: Cyber Awareness Challenge 2025 / Phishing Which of the following is an appropriate use of government e-mail? Steve occasionally runs errands during virtual meetings. He joins the meetings using his approved government device. Does this pose a security concern? How can you prevent viruses and malicious code? Ref: Cyber Awareness Challenge 2025 / Protecting Against Malicious Code Matt is a government employee who needs to share a document containing source selection data with his supervisor. Which of the following describes the most appropriate way for Matt to do this? Ref: Cyber Awareness Challenge 2025 / Best Practices for Home Computer Security Which of the following poses a security risk while teleworking in an environment where Internet of Things (IoT) devices are present? All of these. Which of these is NOT a potential indicator that your device may be under a malicious code attack? An operating system update (Correct) Ref: Cyber Awareness Challenge 2025 / Incident Indicators What are the requirements for access to Sensitive Compartmented Information (SCI? Top Sceret clearance and indoctrination into the SCI program Which of the following is an example of removable media? Compact disc Which of the following is an example of behavior that you should report? Bringing a phone into a prohibited area Which of the following is NOT an appropriate use of your Common Access Card (CAC)? Exchanging it for a visitor pass in another building. (Correct) Ref: Cyber Awareness Challenge 2025 / CAC/PIV Card Protection You receive a phone call from an unknown person asking for a directory name on your government furnished laptop so that a software update can be made. Which course of action should you take? Document the interaction and contact your security POC or help desk How can you protect your home computer? Install spyware protection software Which of the following is an appropriate use of a DoD Public Key Infrastructure (PKI) token? Only leave it in a system while actively using it for a PKI-required task Tessa is processing payroll data that includes employees' names, home addresses, and salary. Which of the following is Tessa prohibited from doing with the data? Using her home computer to print the data while working remotely. (Correct) Ref: Cyber Awareness Challenge 2025 / Telework and Home Computer Security Which type of data could reasonably be expected to cause damage to national security? Secret Which of the following is truc of Sensitive Compartmented Information Facilitics (SCIFs)? SCIFs are not permitted to be constructed with windows unless fixed, unalterable window coverings are in place. When allowed, which of the following is an appropriate use of removable media? Labeling media that contains personally identifiable information (PID (Correct) Ref: Cyber Awareness Challenge 2025 / Appropriate Use of Removable Media Which of the following is a potential Insider threat indicator? Financial windfall from an inheritance Which of the following is a best practice when browsing the Internet? Look for h-t-t-p-s in the URL name Which of the following would work in combination for tow-factor authentication? Common Access Card (CAC) and Personal Identification Number (PIN) Which of the following is a best practice for protecting your home wireless network for telework or remote work? Implement, as a minimum, Wi-Fi Protected Access 2 (WPA2) Personal encryption. Which of the following is true of removable media and portable electronic devices (PEDs) Removable media pose more risks than PEDs and are not permitted in government facilities? Which of the following statements about Protected Health Information (PHI) is truc? It refers to all health information, regardless of the source or recipient. Connect with a Government VPN. (Correct) Ref: Cyber Awareness Challenge 2025 / Traveling with Mobile Devices What is an insider threat? Someone who uses authorized access, either wittingly or unwittingly, to harm national security. (Correct) Ref: Cyber Awareness Challenge 2025 / Insider Threat Which of the following is a best practice for telework and remote work? Connect to your Government Virtual Private Network (VPN) (Correct) Ref: Cyber Awareness Challenge 2025 / Telework and Home Computer Security Which of the following is true of spillage? It can be inadvertent or intentional. (Correct) Ref: Cyber Awareness Challenge 2025 / Spillage Which of the following would work in combination for two-factor authentication? Common Access Card (CAC) and Personal Identification Number (PTN) (Correct) Ref: Cyber Awareness Challenge 2025 / Identity Authentication Under which Cyberspace Protection Condition (CAPCON) is the priority focus limited to critical functions? CPCON 1 (Correct) Ref: Cyber Awareness Challenge 2025 / Cyberspace Protection Conditions (CPCON) Which of the following is true of working within a Sensitive Compartmented Information Facility (SCIF)? Badges must be worn while in the facility and removed when leaving the facility. (Correct) Ref: Cyber Awareness Challenge 2025 / Sensitive Compartmented Information (SCT) When is the safest time to post on social media about your work-related travel? After the trip (Correct) Ref: Common Sense As you browse a social media site, you come across photos of information with classified markings. What should you do? Notify your sccurity point of contact. (Correct) Ref: Cyber Awareness Challenge 2025 / Responding to Spillage