DEPARTMENT OF DEFENSE 9DOD CYBER
AWARENESS CHALLENGE 2025
FLASHCARDS
EXAM PREPARATION GUIDE | 25 ITEMS
Q:Which of the following is an example of removable media?
Compact disc
Q:Which of the following is not an appropriate use of your Common Access Card
(CAC)?
Exchanging it for a visitor pass in another building
Q:Which of the following is true of transmitting or transporting Sensitive
Compartmented Information (SCI)?You many only transport SCI if you have been courier-briefed for SCI.
Q:What is an insider threat?
Someone who uses authorized access, either wittingly or unwittingly, to harm national security.
Q:Which of the following statements about Protected Health Information (PHI) is
true?It is protected health information that can identify an individual.
Q:You receive an e-mail marked important from your agency head asking you to
call them using a number you don't recognize. The e-mail was sent from a personal e-mail address that you don't recognize, but it addresses you by name.What action should you take?This may be a spear phishing attempt. Report it to your security POC or help desk.
Q:Which of the following is permitted when using an unclassified laptop within a collateral classified space?Used government issued wired peripherals and disable the embedded camera, microphone, and Wi-Fi
Q:Based on the description provided, how many insider threat indicators are
present? Edward has worked for a DoD agency for 2 years. He is an analyst who takes a great deal of interest in his work. He occasionally takes a somewhat aggressive interest in others' work as well, including asking for classified details in their projects. He otherwise gets along well with his colleagues.1
Q:Which of the following is true about spillage?
It refers specifically to classified information that becomes publicly available.
Q:What is the best practice for creating user accounts for your home computer?
Create separate accounts for each user and have each user create their own password.
Q:Which of the following is a best practice to protect your identity?
Ask how your information will be used before giving it out
Q:Which of the following personally owned peripherals can you use with
government furnished equipment (GFE)?A wired keyboard connected via USB
Q:Which of the following is a best practice for protecting your home wireless
network for telework or remote work?Implement, as a minimum, Wi-Fi Protected Access 2 (WPA2) Personal encryption
Q:Which of the following is a potential insider threat indicator?
Death of a spouse
Q:Adam sees a coworker who does not have the required clearance with a printed
document marked as Sensitive Compartmented Information (SCI). What should he do?Contact his security POC to report the incident.
Q:Which of the following is an appropriate use of government e-mail?
Using a digital signature when sending hyperlinks Q:Does it pose a security risk to tap your smartwatch to pay for a purchase as a store?Yes, there is a risk that the signal could be intercepted and altered.
Q:As you browse a social media site, you come across photos of information with
classification markings. What should you do?Notify your security point of contact.
Q:Which of the following statements is true of DoD Unclassified data?
It must be cleared before being released to the public.
Q:Which of the following can be used to catalogue information about you?
All of these
Q:John receives an e-mail about a potential shutdown of a major social service
unless a petition receives enough signatures. Which of the following actions should John NOT take with the e-mail?Forward it
Q:How can you protect your home computer?
Install spyware protection software Q:When is the safest time to post on social media about your work-related travel?After the trip
Q:How can malicious code do damage?
All of these
Q:Which of the following uses of removable media is allowed?
Sam uses approved government owned removable media to transfer files between government systems as authorized.