DOD CYBER AWARENESS CHALLENGE 2025
KNOWLEDGE CHECK FLASHCARDS
EXAM PREPARATION GUIDE | 25 ITEMS
Q:You receive an e-mail marked important from your agency head asking you to
call them using a number you do not recognize. The e-mail was sent from a personal e-mail address that you do not recognize, but it addresses you by name.What action should you take?This may be a spear phishing attempt. Report it to your security POC or help desk.Q:You receive a phone call from an unknown person asking for a directory name on your government furnished laptop so that a software update can be made. Which course of action should you take?Document the interaction and contact your security POC or help desk
Q:Which of the following is a way to protect classified data?
Store it in a GSA-approved container
Q:Which of the following is an example of removable media?
Compact disc Q:You receive an e-mail with a link to run an anti-virus scan. Your IT department has not sent links like this in the past. The e-mail is not digitally signed. What action should you take?Report the e-mail to your security POC or help desk.
Q:Which of the following is true of compressed URLs (e.g., TinyURL, goo.gl)?
They may be used to mask malicious intent
Q:How can you protect yourself on social networking sites?
Validate connection requests through another source if possible
Q:What is a best practice for creating user accounts for your home computer?
Create separate accounts for each user and have each user create their own password.
Q:Which of the following is NOT an appropriate use of your Common Access Card
(CAC)?
Exchanging it for a visitor pass in another building.Q:Which of the following is permitted when using an unclassified laptop within a collateral classified space?A personally-owned wired headset without a microphone
Q:How can you protect data on a mobile device?
Use two-factor authentication
Q:Which of the following is an appropriate use of government e-mail?
Using a digital signature when sending hyperlinks
Q:How can you protect your home computer?
Use legitimate, known antivirus software
Q:How can you prevent viruses and malicious code?
Scan all e-mail attachments Q:Steve occasionally runs errands during virtual meetings. He joins the meetings using his approved government device. Does this pose a security concern?Yes. Eavesdroppers may be listening to Steve's conversation
Q:Which of these is NOT a potential indicator that your device may be under a
malicious code attack?An operating system update
Q:John receives an e-mail about a potential shutdown of a major social service
unless a petition receives enough signatures. Which of the following actions should John NOT take with the e-mail?Forward it Q:Which of the following is an appropriate use of a DoD Public Key Infrastructure (PKI) token?Only leave it in a system while actively using it for a PKI-required task
Q:What are the requirements for access to Sensitive Compartmented Information
(SCI)?
Top Secret clearance and indoctrination into the SCI program
Q:How can you protect your home computer?
Install spyware protection software
Q:Which of the following is an example of behavior that you should report?
Bringing a phone into a prohibited area
Q:Which of the following is a best practice to protect your identity?
Ask how information will be used before giving it out.
Q:How can you protect yourself from identity theft?
Review your credit report annually
Q:Matt is a government employee who needs to share a document containing source
selection data with his supervisor. Which of the following describes the most appropriate way for Matt to do this?Encrypt it and send it via digitally signed Government e-mail
Q:Which of the following poses a security risk while teleworking in an environment where Internet of Things (IoT) devices are present?All of these.