• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

2026 CYBER AWARENESS CHALLENGE

Class notes Jan 8, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

2026 CYBER AWARENESS CHALLENGE

FLASHCARDS

EXAM PREPARATION GUIDE | 25 ITEMS

Q:Which of the following is a best practice to protect your identity?

Monitor your financial statements and credit reports.

Q:What consequence could you expect from modifying government equipment

without authorization?All of these

Q:What is a risk to Government systems posed by removable media?

Their data storage and ability to connect to systems can lead to unintended transfers of information, such as introduction of malicious code or spillage.

Q:What is a Security Classification Guide?

A primary source for derivative classification.Q:You receive a suspicious e-mail that appears to have come from an organization that partners with your agency. Your co-workers have received a similar e-mail.What might this be?Spear phishing.

Q:Peter enters an empty conference room and finds a document with a Top Secret

coversheet on it. Peter has a Secret clearance. What should Peter do?Immediately notify his security POC and not handle the file

Q:You have been issued a new Government-owned mobile device. What is a step

you should take to secure it?Set up a passcode to unlock it.

Q:In what level of system can you use a SIPRNet public key infrastructure (PKI)

token?SIPRNet.Q:Trisha receives an e-mail with a sensational rumor about a celebrity's personal life. Which of the following actions should Trisha NOT take with the e-mail?Forward it

Q:You receive a text message from a commercial shipping company notifying you

that they need an updated address to deliver a package to you. It provides a link for you to provide the information needed. What is the best course of action?Delete the message.Q:Which of the following is an example of a correct way to protect classified data?Andrea verifies need-to-know and security eligibility before sharing classified information.

Q:Which of the following personally owned peripherals can you use with

government furnished equipment (GFE)?Only government furnished peripherals are authorized for use.Q:Which of the following is an allowed use of a government-furnished smartphone?Responding to e-mails on your government e-mail account.

Q:Which of the following e-mail practices can help to prevent inadvertently

downloading viruses?Look for a digital signature on e-mails

Q:Walter shares a link to a news article about the Department of Defense on his

social media. Along with the link, he states that he disagrees with the reporting in the article as a DoD employee. Does this pose a security concern?Yes. Walter should avoid appearing to speak on behalf of the Government.

Q:Which type of information could reasonably be expected to cause exceptionally

grave damage to national security if disclosed?Top Secret.

Q:Ed has authorized access to his agency's Sensitive Compartmented Information

Facility (SCIF) and plans to work on a project there today. Which of the following can't he take into the SCIF?All of these.

Q:Which of the following formats may be considered official records for

Government communications?All of these.

Q:What is Controlled Unclassified Information (CUI)?

Information that belongs to a category established in the DoD CUI Registry.

Q:How can you identify the separation of Sensitive Compartmented Information

(SCI) classified material from collateral classified material?Markings that identify the compartment with which it is affiliated

Q:How can you protect your home computer?

Scan files for viruses

Q:Which of the following is a potential insider threat indicator?

untreated alcohol use disorder Q:While at your workstation, you hear an unusual sound coming from the direction of the office door. Before you go to check on the noise, what must you do Remove your Common Access Card (CAC) from your workstation.

Q:Travis is processing travel reimbursements for the past quarter and needs to

share travel rosters containing passport numbers with his supervisor for approval. Which is an approved way to transmit this information?Encrypted Government e-mail with a digital signature.

Q:Which of the following is a best practice for working offsite during official travel?Position your monitor so that it is not easily observed by others while in use

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Class notes
Description:

2026 CYBER AWARENESS CHALLENGE FLASHCARDS EXAM PREPARATION GUIDE | 25 ITEMS Q:Which of the following is a best practice to protect your identity? Monitor your financial statements and credit report...

UNLOCK ACCESS $11.99