PDF Download
DOD CYBER AWARENESS CHALLENGE 2025 KNOWLEDGE
CHECK EXAM QUESTIONS
Actual Qs and Ans - Expert-Verified Explanation -Guaranteed passing score -64 Questions and Answers
-Format: Multiple-choice / Flashcard
Question 1: How can you protect a mobile device while traveling?
Answer:
Connect with a Government VPN. (Correct)
Ref: Cyber Awareness Challenge 2025 / Traveling with Mobile Devices
Question 2: Which of the following is an appropriate use of government e-mail?
Answer:
Using a digital signature when sending hyperlinks (Correct)
Ref: Cyber Awareness Challenge 2025 / Use of Government E-mail
Question 3: Matt is a government employee who needs to share a document containing source selection data with his supervisor. Which of the following describes the most appropriate way for Matt to do this?
Answer:
Encrypt it and send it via digitally signed Government e-mail. (Correct)
Ref: Cyber Awareness Challenge 2025 / Protecting PII/PHI
Question 4: Which of the following is NOT an appropriate use of your Common Access Card
(CAC)?
Answer:
Exchanging it for a visitor pass in another building. (Correct)
Ref: Cyber Awareness Challenge 2025 / CAC/PIV Card Protection
Question 5: Which of the following is true of compressed URLs (e.g., TinyURL, goo.gl)?
Answer:
They may be used to mask malicious intent. (Correct)
Ref: Cyber Awareness Challenge 2025 / Compressed URLs
Question 6: Which of the following poses a security risk while teleworking in an environment where Internet of Things (IoT) devices are present?
Answer:
All of these. (Correct)
Ref: Cyber Awareness Challenge 2025 / Internet of Things (IoT)
Question 7: How can you prevent viruses and malicious code?
Answer:
Scan all e-mail attachments (Correct)
Ref: Cyber Awareness Challenge 2025 / Protecting Against Malicious Code
Question 8: Which of the following is an example of removable media?
Answer:
Compact disc (Correct)
Ref: Cyber Awareness Challenge 2025 / Removable Media, PEDs, and Mobile Devices
Question 9: When allowed, which of the following is an appropriate use of removable media?
Answer:
Labeling media that contains personally identifiable information (PII) (Correct)
Ref: Cyber Awareness Challenge 2025 / Appropriate Use of Removable Media
Question 10: Which of the following describes Sensitive Compartmented Information (SCI)?
Answer:
SCI introduces an overlay of security to Top Secret, Secret, and Confidential information. (Correct)
Ref: Cyber Awareness Challenge 2025 / Sensitive Compartmented Information (SCI)
Question 11: Under which Cyberspace Protection Condition (CAPCON) is the priority focus limited to critical functions?
Answer:
CPCON 1 (Correct)
Ref: Cyber Awareness Challenge 2025 / Cyberspace Protection Conditions (CPCON)
Question 12: Which of the following is a best practice when browsing the Internet?
Answer:
Look for h-t-t-p-s in the URL name. (Correct)
Ref: Cyber Awareness Challenge 2025 / Web Use and Your Safety
Question 13: Which of the following is a best practice for physical security?
Answer:
Report suspicious activity. (Correct)
Ref: Cyber Awareness Challenge 2025 / Physical Security
Question 14: You receive a phone call from an unknown person asking for a directory name on your government furnished laptop so that a software update can be made. Which course of action should you take?
Answer:
Document the interaction and contact your security POC or help desk. (Correct)
Ref: Cyber Awareness Challenge 2025 / Social Engineering
Question 15: How can you protect data on a mobile device?
Answer:
Use two-factor authentication (Correct) Ref: Cyber Awareness Challenge 2025 / Protecting Data on Mobile Devices and PEDs Question 16: Does it pose a risk to tap your smartwatch to pay for a purchase at a store?
Answer:
Yes, there is a risk that the signal could be intercepted and altered. (Correct)
Ref: Cyber Awareness Challenge 2025 / Near Field Communication (NFC)
Question 17: As you browse a social media site, you come across photos of information with classified markings. What should you do?
Answer:
Notify your security point of contact. (Correct)
Ref: Cyber Awareness Challenge 2025 / Responding to Spillage
Question 18: Which of the following personally owned peripherals can you use with government furnished equipment (GFE)?
Answer:
A wired keyboard connection via USB. (Correct)
Ref: Cyber Awareness Challenge 2025 / Peripherals
Question 19: Which type of data could reasonably be expected to cause damage to national security?
Answer:
Confidential (Correct)
Ref: Cyber Awareness Challenge 2025 / Classified Data
Question 20: Which of the following is true of working within a Sensitive Compartmented Information Facility (SCIF)?
Answer:
Badges must be worn while in the facility and removed when leaving the facility. (Correct) Ref: Cyber Awareness Challenge 2025 / Sensitive Compartmented Information Facilities (SCIFs) Question 21: Which of the following is permitted within a Sensitive Compartmented Information Facility (SCIF)?
Answer:
An authorized Government-owned Portable Electronic Device (PED) (Correct) Ref: Cyber Awareness Challenge 2025 / SCIFs and Portable Electronic Devices (PEDs) Question 22: What are the requirements for access to Sensitive Compartmented Information
(SCI)?
Answer:
Top Secret clearance and indoctrination into the SCI program. (Correct)
Ref: Cyber Awareness Challenge 2025 / Sensitive Compartmented Information (SCI)
Question 23: You receive an e-mail marked important from your agency head asking you to call them using a number you do not recognize. The e-mail was sent from a personal e-mail address that you do not recognize, but it addresses you by name. What action should you take?
Answer:
This may be a spear phishing attempt. Report it to your security POC or help desk. (Correct)
Ref: Cyber Awareness Challenge 2025 / Spear Phishing
Question 24: Which of the following is a best practice for protecting your home wireless network for telework or remote work?
Answer:
Implement, as a minimum, Wi-Fi Protected Access 2 (WPA2) Personal encryption. (Correct)