CYBER AWARENESS CHALLENGE V2025
FLASHCARDS
EXAM PREPARATION GUIDE | 28 ITEMS
Q:Which of the following statements is true of DOD unclassified data?
It may require access and distribution controls
Q:How can you prevent viruses and malicious code?
Scan all external files before uploading into your computer
Q:you receive a text message from a package shipper notifying you that your
package delivery is delayed due to needing updated delivery instructions from you. It provides a shortened link for you to provide the needed information. You are not expecting package. What is the best course of action?Delete the message
Q:Carl receives an email about a potential health risk caused by a common
ingredient in process food. Which of the following following actions should Carl not take with the email?forward it Q:Which of the following is an authoritative source for derivative classification?Security Classification Guide Q:Under which cyberspace protection condition (cpcon) is the priority focus limited to critical and essential functions??
Q:which of these is not a potential indicator that your device may be under a
malicious code attack?A notification for a system update that has been publicized.Q:You receive an email with the link to schedule a time to update software on your government furnish laptop. Your IT department has not scheduled software updates like this in the past and has not announced the software update. The email is not digitally signed. What action should you take?Report the email to your security POC or help desk.Q:Which of the following is true of sensitive compartmented information facilities?personnel disposition monitor so that they do not face windows or close the window blinds
Q:Which of the following contributes to your online identity?
Social networking sites, audio, enabled, digital assistance, and fitness trackers. All of these.
Q:Oliver uses his phone to look up information about a jacket he might want to
purchase. Later, he notices ads for the jacket appearing on websites that he views using his laptop. Why would he see this happen?Oliver's apps and devices collect and share information about him
Q:Which of the following is not a best practice for traveling overseas with the
mobile device?Store the device in a hotel safe when sightseeing
Q:What is the goal of an insider threat program?
Deter, Detect, and Mitigate the risks associated with insider threats
Q:Which of the following is not an appropriate use of your common access card?
Using it as photo identification with a commercial entity
Q:Tom is working on a report that contains employees names, home addresses, and
salary. Which of the following is prohibited from doing with the report?using his home computer to print the report while teleworking.Q:which of the following is least likely oppose a risk to share on a social networking site?your pet's name
Q:Which of the following is true of spillage?
It refers specifically to classified information that becomes publicly available.
Q:what is a security classification guide?
?
Q:Which of the following is permitted within a sensitive compartmented
information facility?An authorized government owned portable electronic device
Q:On your home computer, how can you best establish passwords when creating
separate user accounts?Have each user create their own, strong password Q:Which of the following describes sensitive compartmented information? SCI is a program that ___ various types of classified information for ___ protection and dissemination or distribution control.Segregates; added Q:How can an adversary use information available in public records to target you?Combine it with information from other data sources to learn how best to bait you with a scam.
Q:which best describes an insider threat? Someone who uses ___ access, ___, to
harm national security through unauthorized disclosure, data, modification, espionage, terrorism, or kinetic actions.authorized; wittingly or unwittingly
Q:Which of the following is the best practice for managing connection requests on social networking sites?Validate connection requests through another source if possible Q:which of the following is not a best practice for teleworking in an environment where Internet of things (IoT) devices are present?Use the devices' default security settings.Q:which of the following is an allowed use of government furnish equipment (GFE)?checking personal email if your organization allows it
Q:Which of the following uses of removable media is appropriate?
encrypting data stored on removable media
Q:Which of the following is not a best practice for protecting data on a mobile
device?Disable automatic screen locking after a period of inactivity