Study online at https://quizlet.com/_fv066n
1. Which of the following is true of compressed URLs (e.g., TinyURL, goo.gl)?: They
may be used to mask malicious intent. (Correct)
Ref: Cyber Awareness Challenge 2025 / Compressed URLs
2. What is a best practice for creating user accounts for your home computer?-
: Create separate accounts for each user and have each user create their own password. (Correct)
Ref: Cyber Awareness Challenge 2025 / Best Practices for Home Computer Security
3. Which of the following is a best practice to protect your identity?: Ask how
information will be used before giving it out. (Correct)
Ref: Cyber Awareness Challenge 2025 / Identity Protection
4. John receives an e-mail about a potential shutdown of a major social service
unless a petition receives enough signatures. Which of the following actions
should John NOT take with the e-mail?: Forward it (Correct)
Ref: Cyber Awareness Challenge 2025 / Phishing
5. Which of the following is an appropriate use of government e-mail?: Using a digita
signature when sending hyperlinks (Correct)
Ref: Cyber Awareness Challenge 2025 / Use of Government E-mail
6. Steve occasionally runs errands during virtual meetings. He joins the meet-
ings using his approved government device. Does this pose a security concern?-
: Yes. Eavesdroppers may be listening to Steve's conversation (Correct)
Ref: Common Sense
7. How can you prevent viruses and malicious code?: Scan all e-mail attachments (Correct)
Ref: Cyber Awareness Challenge 2025 / Protecting Against Malicious Code
8. Matt is a government employee who needs to share a document containing
source selection data with his supervisor. Which of the following describes the
most appropriate way for Matt to do this?: Encrypt it and send it via digitally signed Government
e-mail. (Correct)
1/9
, DOD Cyber Awareness Challenge 2025 Knowledge check
Study online at https://quizlet.com/_fv066n
Ref: Cyber Awareness Challenge 2025 / Protecting PII/PHI
9. You receive an e-mail with a link to run an anti-virus scan. Your IT department
has not sent links like this in the past. The e-mail is not digitally signed. What
action should you take?: Report the e-mail to your security POC or help desk. (Correct)
Ref: Cyber Awareness Challenge 2025 / Phishing
10. Which of the following is a way to protect classified data?: Store it in a GSA-approved
container. (Correct)
Ref: Cyber Awareness Challenge 2025 / Protecting Classified Data
11. How can you protect yourself from identity theft?: Review your credit report annually.
(Correct)
Ref: Cyber Awareness Challenge 2025 / Identity Protection
12. How can you protect your home computer?: Use legitimate, known antivirus software
(Correct)
Install spyware protection software. (Correct)
Ref: Cyber Awareness Challenge 2025 / Best Practices for Home Computer Security
13. Which of the following poses a security risk while teleworking in an environ-
ment where Internet of Things (IoT) devices are present?: All of these. (Correct)
Ref: Cyber Awareness Challenge 2025 / Internet of Things (IoT)
14. Which of these is NOT a potential indicator that your device may be under a
malicious code attack?: An operating system update (Correct)
Ref: Cyber Awareness Challenge 2025 / Incident Indicators
15. What are the requirements for access to Sensitive Compartmented Informa-
tion (SCI)?: Top Secret clearance and indoctrination into the SCI program. (Correct)
Ref: Cyber Awareness Challenge 2025 / Sensitive Compartmented Information (SCI)
2/9