• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

DOD CYBER AWARENESS CHALLENGE 2025

Class notes Jan 8, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

DOD CYBER AWARENESS CHALLENGE 2025

FLASHCARDS

EXAM PREPARATION GUIDE | 25 ITEMS

Q:Which of the following is an example of a strong password?

bRobr@791*P

Q:You receive an e-mail marked important from your agency head asking you to

call them using a number you do not recognize. The e-mail was sent from a personal e-mail address that you do not recognize, but it addresses you by name.What action should you take?This may be a spear phishing attempt. Report it to your security POC or help desk.

Q:Which of the following is true of compressed URLs (e.g., TinyURL, goo.gl)?

They may be used to mask malicious intent.

Q:Which of the following is permitted within a Sensitive Compartmented

Information Facility (SCIF)?An authorized Government-owned Portable Electronic Device (PED)

Q:How can you protect a mobile device while traveling?

Connect with a Government VPN Q:You receive a phone call from an unknown person asking for a directory name on your government furnished laptop so that a software update can be made. Which course of action should you take?Document the interaction and contact your security POC or help desk.

Q:Tessa is processing payroll data that includes employees' names, home addresses, and salary. Which of the following is Tessa prohibited from doing with the data?Using her home computer to print the data while working remotely

Q:Which of the following is NOT an appropriate use of your Common Access Card

(CAC)?

Exchanging it for a visitor pass in another building

Q:What is a best practice for creating user accounts for your home computer?

Create separate accounts for each user and have each user create their own password.Q:When allowed, which of the following is an appropriate use of removable media?Labeling media that contains personally identifiable information (PII) Q:You receive a text message from a vendor notifying you that your order is on hold due to needing updated payment information from you. It provides a shortened link for you to provide the needed information. What is the best course of action?Delete the message

Q:Which of the following is a best practice for protecting your home wireless

network for telework or remote work?Implement, as a minimum, Wi-FI Protected Access 2 (WPA2) Personal encryption

Q:Which of the following statements is true of DoD Unclassified data?

Do not have the potential to damage national security.

Q:How can you protect your home computer?

Use legitimate, known antivirus software

Q:Under which Cyberspace Protection Condition (CPCON) is the priority focus

limited to critical functions?

CPCON 1

Q:Based on the description provided, how many insider threat indicators are

present? Edward has worked for a DoD agency for 2 years. He is an analyst who takes a great deal of interest in his work. he occasionally takes a somewhat aggressive interest in others' work as well, including asking for classified details of their projects. he otherwise gets along well with his colleagues.1

Q:Which of these is NOT a potential indicator that your device may be under a

malicious code attack?An operating system update

Q:Which of the following can be used to catalogue information about you?

All of these

Q:Which of the following provides precise, comprehensive guidance regarding

specific program, system, operation, or weapon system elements of information to be classified?Security Classification Guide

Q:Which of the following is an allowed use of government furnished equipment

(GFE)?

E-mailing your supervisor

Q:Which of the following is true of spillage?

It can be either inadvertent or intentional Q:As you scroll through your social media feed, a news headline catches your eye.What should you consider before sharing it with your connections?Whether the source is credible and reliable

Q:How can malicious code do damage?

All of these

Q:Which of the following is true of removable media and portable electronic devices (PEDs)?They cannot be adequately secured, so they are prohibited by the DoD.

Q:As you browse a social media site, you come across photos of information with

classification markings. What should you do?Notify your security point of contact

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Class notes
Description:

DOD CYBER AWARENESS CHALLENGE 2025 FLASHCARDS EXAM PREPARATION GUIDE | 25 ITEMS Q:Which of the following is an example of a strong password? bRobr@791*P Q:You receive an e-mail marked important fro...

UNLOCK ACCESS $11.99