• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

DEPARTMENT OF DEFENSE 9DOD CYBER

Class notes Jan 8, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

DEPARTMENT OF DEFENSE 9DOD CYBER

AWARENESS CHALLENGE 2025

FLASHCARDS

EXAM PREPARATION GUIDE | 25 ITEMS

Q:Which of the following is an example of removable media?

Compact disc

Q:Which of the following is not an appropriate use of your Common Access Card

(CAC)?

Exchanging it for a visitor pass in another building

Q:Which of the following is true of transmitting or transporting Sensitive

Compartmented Information (SCI)?You many only transport SCI if you have been courier-briefed for SCI.

Q:What is an insider threat?

Someone who uses authorized access, either wittingly or unwittingly, to harm national security.

Q:Which of the following statements about Protected Health Information (PHI) is

true?It is protected health information that can identify an individual.

Q:You receive an e-mail marked important from your agency head asking you to

call them using a number you don't recognize. The e-mail was sent from a personal e-mail address that you don't recognize, but it addresses you by name.What action should you take?This may be a spear phishing attempt. Report it to your security POC or help desk.

Q:Which of the following is permitted when using an unclassified laptop within a collateral classified space?Used government issued wired peripherals and disable the embedded camera, microphone, and Wi-Fi

Q:Based on the description provided, how many insider threat indicators are

present? Edward has worked for a DoD agency for 2 years. He is an analyst who takes a great deal of interest in his work. He occasionally takes a somewhat aggressive interest in others' work as well, including asking for classified details in their projects. He otherwise gets along well with his colleagues.1

Q:Which of the following is true about spillage?

It refers specifically to classified information that becomes publicly available.

Q:What is the best practice for creating user accounts for your home computer?

Create separate accounts for each user and have each user create their own password.

Q:Which of the following is a best practice to protect your identity?

Ask how your information will be used before giving it out

Q:Which of the following personally owned peripherals can you use with

government furnished equipment (GFE)?A wired keyboard connected via USB

Q:Which of the following is a best practice for protecting your home wireless

network for telework or remote work?Implement, as a minimum, Wi-Fi Protected Access 2 (WPA2) Personal encryption

Q:Which of the following is a potential insider threat indicator?

Death of a spouse

Q:Adam sees a coworker who does not have the required clearance with a printed

document marked as Sensitive Compartmented Information (SCI). What should he do?Contact his security POC to report the incident.

Q:Which of the following is an appropriate use of government e-mail?

Using a digital signature when sending hyperlinks Q:Does it pose a security risk to tap your smartwatch to pay for a purchase as a store?Yes, there is a risk that the signal could be intercepted and altered.

Q:As you browse a social media site, you come across photos of information with

classification markings. What should you do?Notify your security point of contact.

Q:Which of the following statements is true of DoD Unclassified data?

It must be cleared before being released to the public.

Q:Which of the following can be used to catalogue information about you?

All of these

Q:John receives an e-mail about a potential shutdown of a major social service

unless a petition receives enough signatures. Which of the following actions should John NOT take with the e-mail?Forward it

Q:How can you protect your home computer?

Install spyware protection software Q:When is the safest time to post on social media about your work-related travel?After the trip

Q:How can malicious code do damage?

All of these

Q:Which of the following uses of removable media is allowed?

Sam uses approved government owned removable media to transfer files between government systems as authorized.

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Class notes
Description:

DEPARTMENT OF DEFENSE 9DOD CYBER AWARENESS CHALLENGE 2025 FLASHCARDS EXAM PREPARATION GUIDE | 25 ITEMS Q:Which of the following is an example of removable media? Compact disc Q:Which of the followi...

UNLOCK ACCESS $11.99