• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

DOD CYBER AWARENESS CHALLENGE 2025

Class notes Jan 8, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

DOD CYBER AWARENESS CHALLENGE 2025

KNOWLEDGE CHECK FLASHCARDS

EXAM PREPARATION GUIDE | 25 ITEMS

Q:You receive an e-mail marked important from your agency head asking you to

call them using a number you do not recognize. The e-mail was sent from a personal e-mail address that you do not recognize, but it addresses you by name.What action should you take?This may be a spear phishing attempt. Report it to your security POC or help desk.Q:You receive a phone call from an unknown person asking for a directory name on your government furnished laptop so that a software update can be made. Which course of action should you take?Document the interaction and contact your security POC or help desk

Q:Which of the following is a way to protect classified data?

Store it in a GSA-approved container

Q:Which of the following is an example of removable media?

Compact disc Q:You receive an e-mail with a link to run an anti-virus scan. Your IT department has not sent links like this in the past. The e-mail is not digitally signed. What action should you take?Report the e-mail to your security POC or help desk.

Q:Which of the following is true of compressed URLs (e.g., TinyURL, goo.gl)?

They may be used to mask malicious intent

Q:How can you protect yourself on social networking sites?

Validate connection requests through another source if possible

Q:What is a best practice for creating user accounts for your home computer?

Create separate accounts for each user and have each user create their own password.

Q:Which of the following is NOT an appropriate use of your Common Access Card

(CAC)?

Exchanging it for a visitor pass in another building.Q:Which of the following is permitted when using an unclassified laptop within a collateral classified space?A personally-owned wired headset without a microphone

Q:How can you protect data on a mobile device?

Use two-factor authentication

Q:Which of the following is an appropriate use of government e-mail?

Using a digital signature when sending hyperlinks

Q:How can you protect your home computer?

Use legitimate, known antivirus software

Q:How can you prevent viruses and malicious code?

Scan all e-mail attachments Q:Steve occasionally runs errands during virtual meetings. He joins the meetings using his approved government device. Does this pose a security concern?Yes. Eavesdroppers may be listening to Steve's conversation

Q:Which of these is NOT a potential indicator that your device may be under a

malicious code attack?An operating system update

Q:John receives an e-mail about a potential shutdown of a major social service

unless a petition receives enough signatures. Which of the following actions should John NOT take with the e-mail?Forward it Q:Which of the following is an appropriate use of a DoD Public Key Infrastructure (PKI) token?Only leave it in a system while actively using it for a PKI-required task

Q:What are the requirements for access to Sensitive Compartmented Information

(SCI)?

Top Secret clearance and indoctrination into the SCI program

Q:How can you protect your home computer?

Install spyware protection software

Q:Which of the following is an example of behavior that you should report?

Bringing a phone into a prohibited area

Q:Which of the following is a best practice to protect your identity?

Ask how information will be used before giving it out.

Q:How can you protect yourself from identity theft?

Review your credit report annually

Q:Matt is a government employee who needs to share a document containing source

selection data with his supervisor. Which of the following describes the most appropriate way for Matt to do this?Encrypt it and send it via digitally signed Government e-mail

Q:Which of the following poses a security risk while teleworking in an environment where Internet of Things (IoT) devices are present?All of these.

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Class notes
Description:

DOD CYBER AWARENESS CHALLENGE 2025 KNOWLEDGE CHECK FLASHCARDS EXAM PREPARATION GUIDE | 25 ITEMS Q:You receive an e-mail marked important from your agency head asking you to call them using a number...

UNLOCK ACCESS $11.99