• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

DOD CYBER AWARENESS CHALLENGE 2025 KNOWLEDGE

Class notes Feb 17, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

PDF Download

DOD CYBER AWARENESS CHALLENGE 2025 KNOWLEDGE

CHECK EXAM QUESTIONS

Actual Qs and Ans - Expert-Verified Explanation -Guaranteed passing score -64 Questions and Answers

-Format: Multiple-choice / Flashcard

Question 1: How can you protect a mobile device while traveling?

Answer:

Connect with a Government VPN. (Correct)

Ref: Cyber Awareness Challenge 2025 / Traveling with Mobile Devices

Question 2: Which of the following is an appropriate use of government e-mail?

Answer:

Using a digital signature when sending hyperlinks (Correct)

Ref: Cyber Awareness Challenge 2025 / Use of Government E-mail

Question 3: Matt is a government employee who needs to share a document containing source selection data with his supervisor. Which of the following describes the most appropriate way for Matt to do this?

Answer:

Encrypt it and send it via digitally signed Government e-mail. (Correct)

Ref: Cyber Awareness Challenge 2025 / Protecting PII/PHI

Question 4: Which of the following is NOT an appropriate use of your Common Access Card

(CAC)?

Answer:

Exchanging it for a visitor pass in another building. (Correct)

Ref: Cyber Awareness Challenge 2025 / CAC/PIV Card Protection

Question 5: Which of the following is true of compressed URLs (e.g., TinyURL, goo.gl)?

Answer:

They may be used to mask malicious intent. (Correct)

Ref: Cyber Awareness Challenge 2025 / Compressed URLs

Question 6: Which of the following poses a security risk while teleworking in an environment where Internet of Things (IoT) devices are present?

Answer:

All of these. (Correct)

Ref: Cyber Awareness Challenge 2025 / Internet of Things (IoT)

Question 7: How can you prevent viruses and malicious code?

Answer:

Scan all e-mail attachments (Correct)

Ref: Cyber Awareness Challenge 2025 / Protecting Against Malicious Code

Question 8: Which of the following is an example of removable media?

Answer:

Compact disc (Correct)

Ref: Cyber Awareness Challenge 2025 / Removable Media, PEDs, and Mobile Devices

Question 9: When allowed, which of the following is an appropriate use of removable media?

Answer:

Labeling media that contains personally identifiable information (PII) (Correct)

Ref: Cyber Awareness Challenge 2025 / Appropriate Use of Removable Media

Question 10: Which of the following describes Sensitive Compartmented Information (SCI)?

Answer:

SCI introduces an overlay of security to Top Secret, Secret, and Confidential information. (Correct)

Ref: Cyber Awareness Challenge 2025 / Sensitive Compartmented Information (SCI)

Question 11: Under which Cyberspace Protection Condition (CAPCON) is the priority focus limited to critical functions?

Answer:

CPCON 1 (Correct)

Ref: Cyber Awareness Challenge 2025 / Cyberspace Protection Conditions (CPCON)

Question 12: Which of the following is a best practice when browsing the Internet?

Answer:

Look for h-t-t-p-s in the URL name. (Correct)

Ref: Cyber Awareness Challenge 2025 / Web Use and Your Safety

Question 13: Which of the following is a best practice for physical security?

Answer:

Report suspicious activity. (Correct)

Ref: Cyber Awareness Challenge 2025 / Physical Security

Question 14: You receive a phone call from an unknown person asking for a directory name on your government furnished laptop so that a software update can be made. Which course of action should you take?

Answer:

Document the interaction and contact your security POC or help desk. (Correct)

Ref: Cyber Awareness Challenge 2025 / Social Engineering

Question 15: How can you protect data on a mobile device?

Answer:

Use two-factor authentication (Correct) Ref: Cyber Awareness Challenge 2025 / Protecting Data on Mobile Devices and PEDs Question 16: Does it pose a risk to tap your smartwatch to pay for a purchase at a store?

Answer:

Yes, there is a risk that the signal could be intercepted and altered. (Correct)

Ref: Cyber Awareness Challenge 2025 / Near Field Communication (NFC)

Question 17: As you browse a social media site, you come across photos of information with classified markings. What should you do?

Answer:

Notify your security point of contact. (Correct)

Ref: Cyber Awareness Challenge 2025 / Responding to Spillage

Question 18: Which of the following personally owned peripherals can you use with government furnished equipment (GFE)?

Answer:

A wired keyboard connection via USB. (Correct)

Ref: Cyber Awareness Challenge 2025 / Peripherals

Question 19: Which type of data could reasonably be expected to cause damage to national security?

Answer:

Confidential (Correct)

Ref: Cyber Awareness Challenge 2025 / Classified Data

Question 20: Which of the following is true of working within a Sensitive Compartmented Information Facility (SCIF)?

Answer:

Badges must be worn while in the facility and removed when leaving the facility. (Correct) Ref: Cyber Awareness Challenge 2025 / Sensitive Compartmented Information Facilities (SCIFs) Question 21: Which of the following is permitted within a Sensitive Compartmented Information Facility (SCIF)?

Answer:

An authorized Government-owned Portable Electronic Device (PED) (Correct) Ref: Cyber Awareness Challenge 2025 / SCIFs and Portable Electronic Devices (PEDs) Question 22: What are the requirements for access to Sensitive Compartmented Information

(SCI)?

Answer:

Top Secret clearance and indoctrination into the SCI program. (Correct)

Ref: Cyber Awareness Challenge 2025 / Sensitive Compartmented Information (SCI)

Question 23: You receive an e-mail marked important from your agency head asking you to call them using a number you do not recognize. The e-mail was sent from a personal e-mail address that you do not recognize, but it addresses you by name. What action should you take?

Answer:

This may be a spear phishing attempt. Report it to your security POC or help desk. (Correct)

Ref: Cyber Awareness Challenge 2025 / Spear Phishing

Question 24: Which of the following is a best practice for protecting your home wireless network for telework or remote work?

Answer:

Implement, as a minimum, Wi-Fi Protected Access 2 (WPA2) Personal encryption. (Correct)

Ref: Cyber Awareness Challenge 2025 / Wireless Network

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Class notes
Description:

PDF Download DOD CYBER AWARENESS CHALLENGE 2025 KNOWLEDGE CHECK EXAM QUESTIONS Actual Qs and Ans - Expert-Verified Explanation -Guaranteed passing score -64 Questions and Answers -Format: Multiple-...

UNLOCK ACCESS $11.99