• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

DOD Cyber Awareness Challenge 2025

Latest WGU Jan 17, 2026 ★★★★☆ (4.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

DOD Cyber Awareness Challenge 2025 966 studiers today 4.3 (3 reviews) Students also studied Terms in this set (40) Science Computer Science Computer Security and Reliability Save Cyber Awareness 2026 26 terms Christina_Perez421 Preview FY 2026 Cyber Awareness Challeng...Teacher 25 terms OnHorizonPreview DOD Cyber Awareness Challenge 2...25 terms aishidoooPreview DOD C Teacher Fra Peter enters an empty conference room and finds a document with a Top Secret coversheet on it. Peter has a Secret clearance. What should Peter do?

  • Immediately notify his security POC and not handle the file
  • Verify that the document contains Top Secret information
  • Assume the facility has open storage and leave the document for the owner to
  • return for it

  • Destroy the document using any means available
  • The correct answer is A. Immediately notify his security POC and not handle the file.Which of the following is an example of two-factor authentication?

  • Command Access Card (CAC) and security token
  • Password and fingerprint
  • Fingerprint and face identification (ID)
  • Password and Personal Identification Number (PIN)
  • The correct answer is B. Password and fingerprint.Which of the following is an example of Protected Health Information (PHI)?

  • An individual's medical record maintained by a healthcare provider
  • An individual's purchase history of over-the-counter medications
  • A medical diagnosis for an individual shared by that person
  • The location of a first-aid kit at an office.
  • The correct answer is A. An individual's medical record maintained by a healthcare provider.How should you approach a compressed URL, such as Tiny URL?

  • Never open a compressed URL
  • Right-click the link to see where the link leads
  • Preview where the link leads before opening it
  • Open the link to see where it goes
  • The correct answer is C. Preview where the link leads before opening it.

How can you protect your home computer?A. Disable the password feature

  • Authorize automatic installation of mobile code
  • Disable automatic security updates
  • Turn on spyware protection
  • The correct answer is D. Turn on spyware protection.Evelyn is a system administrator at her agency. As part of her duties, she occasionally uses a thumb drive to perform necessary system tasks, as outlined in her agency's procedures. The thumb drive is provided by the Government for this purpose. Is this an appropriate use of removable media?

  • No. Removable media are never permitted for use in the DoD.
  • Maybe. Evelyn should test the Government thumb drive on a non-
  • organizational system before connecting it to a Government system.

  • Yes. Only use removable media when operationally necessary, Government-
  • owned, and approved in accordance with policy.

  • Yes, and Evelyn may also use personally owned removable media for this
  • purpose.

The correct answer is: C. Yes. Only use removable media when operationally

necessary, Government-owned, and approved in accordance with policy.How do Insider Threat Programs defend against insider threats?

  • Restricting individuals' access to government resources
  • Intervening early to help individuals with issues
  • Imprisoning anyone who exhibits a threat indicator
  • Terminating the employment of any individual who exhibits a threat indicator
  • The correct answer is B. Intervening early to help individuals with issues Which of the following is a best practice for working offsite during official travel?

  • Position your monitor so that it is not easily observed by others while in use
  • Work in well-populated public areas to ensure your physical safety
  • Download or print any classified documents you will need while away from
  • your secure workspace

  • Use personal equipment to connect to the Government Virtual Private Network
  • (VPN) The correct answer is: A. Position your monitor so that it is not easily observed by others while in use.How does an insider threat harm national security? A. Documenting standard operating procedures for operational processes

  • Underperforming their job duties
  • Exploiting their trusted status and authorized access to government resources
  • Threatening to quit their job unless given a promotion and salary increase
  • The correct answer is: C. Exploiting their trusted status and authorized access to government resources.Which of the following formats may be considered official records for Government communications?

  • E-mail
  • Chat
  • SMS messaging
  • All of these

The correct answer is: D. All of the above.

Which of the following is true of transmitting Sensitive Compartmented Information (SCI)?

  • SCI may be faxed using any facsimile machine.
  • SCI may be printed using an authorized printer when retrieved promptly.
  • SCI may only be transmitted electronically.
  • SCI must never be escorted, hand-carried, or couriered.

The correct answer is: B. SCI may be printed using an authorized printer when

retrieved promptly.Travis is processing travel reimbursements for the past quarter and needs to share travel rosters containing passport numbers with his supervisor for approval. Which is an approved way to transmit this information?

  • Printout left on the supervisor's chair in an unsecured area
  • Any e-mail account with multifactor authentication enabled
  • Encrypted third-party application
  • Encrypted Government e-mail with a digital signature

The correct answer is: D. Encrypted Government e-mail with a digital signature

Martha supervises a government unit. To improve morale, she frequently e-mails inspirational stories and photos with inspirational quotes on them to her team. Is this an appropriate use of government e-mail?

  • No. These e-mails generate unnecessary e-mail traffic.
  • Yes. The e-mails don't harm anything and are sent with good intentions.
  • Maybe. It depends on whether her team is offended by these e-mails.
  • Maybe. It depends on the file size of the photos.
  • The correct answer is: A. No. These e-mails generate unnecessary e-mail traffic.Which of the following is a best practice when browsing the Internet?

  • Set your browser to automatically accept all cookies
  • Confirm that the site uses an unencrypted link
  • Look for h-t-t-p in the URL name
  • Look for an icon to indicate encryption is functioning
  • The correct answer is: D. Look for an icon to indicate encryption is functioning.You receive a suspicious e-mail that appears to have come from an organization that partners with your agency. Your co-workers have received a similar e-mail.What might this be?

  • Vishing
  • Whaling
  • Smishing
  • Spear phishing

The correct answer is: D. Spear phishing.

While taking a break at your workstation, you switch to your computer's web browser intending to look up the evening's weather forecast. You notice open tabs in your web browser that you don't recall opening. Is this a concern?

  • Yes. You should close your web browser when you are not actively using it.
  • No. The browser probably just updated.
  • Yes. The appearance of new extensions or tabs in your web browser may
  • indicate a cybersecurity incident.

  • Maybe. It depends on whether someone else may have been using your
  • workstation without your knowledge.

The correct answer is: C. Yes. The appearance of new extensions or tabs in your

web browser may indicate a cybersecurity incident.How can you protect your home computer? (2nd question)

  • Use the default operating system account
  • Disable file backups
  • Turn off the firewall
  • Scan files for viruses

The correct answer is: D. Scan files for viruses.

Sara is a government employee with a high degree of expertise in her field. She receives an e-mail from a foreign national that is complimentary of Sara's expertise and seeks to make a connection with her to learn more about her work. What should Sara do?

  • Provide the contact with her supervisor's contact information
  • Reply to the contact with unclassified documentation about her work
  • Report the contact to her security POC
  • Schedule a meeting with the contact to learn more

The correct answer is: C. Report the contact to her security POC

While picking up lunch at a cafe, Thom waits for his order at an empty table near the pickup counter. When his name is called, he gets up to retrieve his order, briefly leaving his phone sitting on the table where he was waiting. Does this pose a risk?

  • No. He was in sight of his phone, and it was a brief amount of time.
  • Yes. Someone could have taken off with his phone.
  • No. He can have his phone disconnected and get a new one.
  • Maybe. It depends on whether his phone was locked.

The correct answer is: B. Yes. Someone could have taken off with his phone.

Oliver uses his phone to look up information about a jacket he might want to purchase. Later, he notices ads for the jacket appearing on websites that he views using his laptop. Why would he see this happen?

  • Oliver's laptop has been compromised.
  • Oliver's phone has been compromised.
  • The jacket must be really popular.
  • Oliver's apps and devices collect and share information about him.
  • The correct answer is: D. Oliver's apps and devices collect and share information about him.Delia processes healthcare claims for Service members.As part of her duties, she sometimes needs to telephone team members and partner organizations to resolve issues specific to individual claims. As she often needs to access files and take notes on these calls, she prefers to use speakerphone so that her hands are free. She works on-site at a government facility in an open office environment. Does this pose a security concern?

  • No. While it may be annoying, it is an open office environment in a government
  • facility, and Delia's phone calls are necessary in the performance of her work duties.

  • Yes. Even in a closed work environment, Delia should take care when discussing
  • personally identifiable information (PII) where others without a need-to-know may overhear.

  • Maybe. It depends on whether the people who sit near Delia are bothered by
  • her conversations. Otherwise, they are all government employees, so the nature of the information being discussed is not relevant.

  • Maybe. It depends on whether Delia is using a government-issued device for
  • her calls or an unauthorized personal device.

The correct answer is: B. Yes. Even in a closed work environment, Delia should

take care when discussing personally identifiable information (PII) where others without a need-to-know may overhear.What consequence could you expect from modifying government equipment without authorization?

  • Legal repercussions
  • Introduction of malware to the network
  • Increasing the potential for spillage
  • All of these

The correct answer is: D. All of these

How can you take back any content you post to a social networking site if you change your mind?

  • You can't. Once you post it, the site owns your content.
  • Delete the post.
  • Send a request to the site owner to purge your profile data.
  • Disable your site account.
  • The correct answer is: A. You can't. Once you post it, the site owns your content.

User Reviews

★★★★☆ (4.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★☆

I was amazed by the detailed explanations in this document. It enhanced my understanding. Truly outstanding!

Download Document

Buy This Document

$11.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: Latest WGU
Added: Jan 17, 2026
Description:

DOD Cyber Awareness Challenge 2025 966 studiers today 4.3 (3 reviews) Students also studied Terms in this set Science Computer Science Computer Security and Reliability Save Cyber Awareness 2026 26...

Unlock Now
$ 11.00