• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

ANNUAL DOD CYBER AWARENESS

Summary Jan 8, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

ANNUAL DOD CYBER AWARENESS

CHALLENGE EXAM 2026 FLASHCARDS

EXAM PREPARATION GUIDE | 28 ITEMS

Q:In what level of system can you use a SIPRNet public key infrastructure (PKI)

token?SIPRNet

Q:Which of the following is personally owned peripherals can you use with

government furnished equipment (GFE)?Only government furnished peripherals are authorized for use.Q:Oscar is on official Government travel with a Government-issued laptop. While at the airport, he uses the laptop to work on a report containing controlled unclassified information (CUI). For connectivity, he uses his personal phone as a mobile hotspot. Are there any security concerns here?Yes. He should be vigilant for "shoulder surfing," where others may be able to view the information on his screen.

Q:Which of these personally-owned computer peripherals may be used with

government furnished equipment?HDMI monitor and USB keyboard Q:What is the appropriate way to label an approved portable hard drive containing personally identifiable information (PII)?Clearly label the outside as containing PII so that its contents are known

Q:What step should be taken next to securely telework?

Secure the area so others cannot view your monitor

Q:Which of the following is an example of an individual's activity that you should report?Changing workplace behavior abruptly

Q:How can you identity the Sensitive Compartmented Information (SCI) classified

material from collateral classified material?Markings that identify the compartment with which it is affiliated.Q:Delia processes healthcare claims for Service members. As part of her duties, she sometimes needs to telephone team members and partner organizations to resolve issues specific to individual claims. As she often needs to access files and take notes on these calls, she prefers to use speakerphone so that her hands are free.She works on-site at a government facility in an open office environment. Does this pose a security concern?Yes. Even in a closed work environment, Delia should take care when discussing personally identifiable Information (PII) where others without a need-to-know may overhear.

Q:Devon receives an e-mail on her Unclassified computer. The e-mail has an

unmarked attachment that contains what she recognizes as classified information.What should Devon do?Immediately notify her security POC Q:which of the following is an example of a correct way to protect classified data?Andrea verifies need-to-know and security eligibility before sharing classified information.

Q:Oliver uses his phone to look up information about a jacket he might want to

purchase. Later, he notices ads for the jacket appearing on websites that he views using his laptop. Why would he see this happen?Oliver's apps and devices collect and share information about him.

Q:How can you protect your home computer?

Turn on spyware protection

Q:You decide to play music as you work and ask your nearby smart speaker to play your favorites playlist. Is this a security risk?Yes Q:While scrolling your social media feed, you are presented with a news article with an incendiary headline accompanied by a video. What should you consider before sharing this article?You should consider the source and whether this information appears elsewhere

Q:Walter shares a link to a news article about the Department of Defense on his

social media. Along with the link, he states that he disagrees with the reporting in the article as a DoD employee. Does this pose a security concern?Yes. Walter should avoid appearing to speak on behalf of the Government.Q:Which of the following is permitted within a collateral classified environment?A wired headset without a microphone

Q:Which of the following is an example of Personally Identifiable Information

(PII)?

Mother's maiden name

Q:Which of the following is a potential insider threat indicator?

Untreated alcohol use disorder

Q:How should you approach a compressed URL, such as Tiny URL?

Preview where the link leads before opening it Q:Consider this social media post. Are there any security concerns in it? "I'm hosting a family reunion for my mom's side of the family, the Smiths. Come by my place at 1234 Mockingbird Lane on the 8th...and grab a slice of birthday cake for me while you're there!" Yes. It contains several items of personally identifiable information (PII), including the mother's maiden name, home address, and birthday.

Q:How does an insider threat harm national security?

Exploiting their trusted status and authorized access to government resources Q:Martha supervises a government unit. To improve morale, she frequently e-mails inspirational stories and photos with inspirational quotes on them to her team. Is this an appropriate use of government email?No. These e-mails generate unnecessary e-mail traffic.Q:Paula is compiling statistics on healthcare provided to Service members over the last fiscal year. Some of her source data includes Protected Health Information (PHI). How can she properly process this data?Use a Government-issued device to access it from a folder with controlled access.

Q:On a Government-owned mobile device, what should you do before installing an

application?Ensure that it is an approved and authorized application

Q:What is a Security Classification Guide?

A primary source for derivative classification

Q:Which of the following is a best practice to protect your identity?

Monitor your financial statements and credit reports Q:You receive an email with a link to verify that your account is active. It says you must click the link within 2 days. Your IT department has not sent links like this in the past. The email is not digitally signed. What action should you take?Report the email to your security POC or help desk

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Summary
Description:

ANNUAL DOD CYBER AWARENESS CHALLENGE EXAM 2026 FLASHCARDS EXAM PREPARATION GUIDE | 28 ITEMS Q:In what level of system can you use a SIPRNet public key infrastructure (PKI) token? SIPRNet Q:Which of...

UNLOCK ACCESS $11.99