DOD Cyber Awareness Challenge 2025 Knowledge check Flashcards 25 Terms | Your Study Companion Matt is a government employee who needs to share a document containing source selection data with his supervisor. Which of the following describes the most appropriate way for Matt to do this?Encrypt it and send it via digitally signed Government e-mail How can you protect your home computer?Use legitimate, known antivirus software
Which of the following is NOT an appropriate use of your Common Access Card (CAC)?Exchanging it for a visitor pass in another building.Which of the following is an appropriate use of a DoD Public Key Infrastructure (PKI) token?Only leave it in a system while actively using it for a PKI-required task What are the requirements for access to Sensitive Compartmented Information (SCI)?Top Secret clearance and indoctrination into the SCI program
Which of these is NOT a potential indicator that your device may be under a malicious code attack?An operating system update Which of the following is a best practice to protect your identity?Ask how information will be used before giving it out.Which of the following is an example of removable media?Compact disc
How can you protect your home computer?Install spyware protection software How can you protect yourself on social networking sites?Validate connection requests through another source if possible Which of the following is an appropriate use of government e-mail?Using a digital signature when sending hyperlinks