DOD CYBER AWARENESS CHALLENGE KNOWLEDGE CHECK TEST QUESTIONS WITH
ACCURATE SOLUTIONS (ACCURATE REFERENCES)
Which of the following is true of compressed URLs (e.g., TinyURL, goo.gl)?
They may be used to mask malicious intent. (Correct)
Ref: Cyber Awareness Challenge 2025 / Compressed URLs
Which of the following is a best practice for protecting your home wireless network for
telework or remote work?
Implement, as a minimum, Wi-Fi Protected Access 2 (WPA2) Personal encryption. (Correct)
Ref: Cyber Awareness Challenge 2025 / Wireless Network
Which of the following is true of removable media and portable electronic devices (PEDs)
The risk associated with them may lead to loss of life. (Correct)
Ref: Cyber Awareness Challenge 2025 / Removable Media, PEDs, and Mobile Devices
Which of the following statements about Protected Health Information (PHI) is true?
It is health information that identifies the individual. (Correct)
Ref: Cyber Awareness Challenge 2025 / Protected Health Information (PHI)
,Does it pose a risk to tap your smartwatch to pay for a purchase at a store?
Yes, there is a risk that the signal could be intercepted and altered. (Correct)
Ref: Cyber Awareness Challenge 2025 / Near Field Communication (NFC)
Which of the following is an allowed use of government furnished equipment (GFE)?
E-mailing your supervisor (Correct)
Ref: Cyber Awareness Challenge 2025 / Ethical Use of Government-Furnished Equipment
(GFE)
Based on the description provided, how many insider threat indicators are present?
Edward has worked for the DoD agency for 2 years. He is an analyst who takes a great deal
of interest in his work. He occasionally takes a somewhat aggressive interest in others'
work as well, including asking for classified details of their projects. He otherwise gets
along well with his colleagues.
1 (Correct)
Ref: Cyber Awareness Challenge 2025 / Detecting Insider Threats
How can you protect a mobile device while traveling?
Connect with a Government VPN. (Correct)
, Ref: Cyber Awareness Challenge 2025 / Traveling with Mobile Devices
What is an insider threat?
Someone who uses authorized access, either wittingly or unwittingly, to harm national
security. (Correct)
Ref: Cyber Awareness Challenge 2025 / Insider Threat
Which of the following is a best practice for telework and remote work?
Connect to your Government Virtual Private Network (VPN) (Correct)
Ref: Cyber Awareness Challenge 2025 / Telework and Home Computer Security
Which of the following is true of spillage?
It can be either inadvertent or intentional. (Correct)
Ref: Cyber Awareness Challenge 2025 / Spillage
Which of the following would work in combination for two-factor authentication?
Common Access Card (CAC) and Personal Identification Number (PIN) (Correct)
Ref: Cyber Awareness Challenge 2025 / Identity Authentication
ACCURATE SOLUTIONS (ACCURATE REFERENCES)
Which of the following is true of compressed URLs (e.g., TinyURL, goo.gl)?
They may be used to mask malicious intent. (Correct)
Ref: Cyber Awareness Challenge 2025 / Compressed URLs
Which of the following is a best practice for protecting your home wireless network for
telework or remote work?
Implement, as a minimum, Wi-Fi Protected Access 2 (WPA2) Personal encryption. (Correct)
Ref: Cyber Awareness Challenge 2025 / Wireless Network
Which of the following is true of removable media and portable electronic devices (PEDs)
The risk associated with them may lead to loss of life. (Correct)
Ref: Cyber Awareness Challenge 2025 / Removable Media, PEDs, and Mobile Devices
Which of the following statements about Protected Health Information (PHI) is true?
It is health information that identifies the individual. (Correct)
Ref: Cyber Awareness Challenge 2025 / Protected Health Information (PHI)
,Does it pose a risk to tap your smartwatch to pay for a purchase at a store?
Yes, there is a risk that the signal could be intercepted and altered. (Correct)
Ref: Cyber Awareness Challenge 2025 / Near Field Communication (NFC)
Which of the following is an allowed use of government furnished equipment (GFE)?
E-mailing your supervisor (Correct)
Ref: Cyber Awareness Challenge 2025 / Ethical Use of Government-Furnished Equipment
(GFE)
Based on the description provided, how many insider threat indicators are present?
Edward has worked for the DoD agency for 2 years. He is an analyst who takes a great deal
of interest in his work. He occasionally takes a somewhat aggressive interest in others'
work as well, including asking for classified details of their projects. He otherwise gets
along well with his colleagues.
1 (Correct)
Ref: Cyber Awareness Challenge 2025 / Detecting Insider Threats
How can you protect a mobile device while traveling?
Connect with a Government VPN. (Correct)
, Ref: Cyber Awareness Challenge 2025 / Traveling with Mobile Devices
What is an insider threat?
Someone who uses authorized access, either wittingly or unwittingly, to harm national
security. (Correct)
Ref: Cyber Awareness Challenge 2025 / Insider Threat
Which of the following is a best practice for telework and remote work?
Connect to your Government Virtual Private Network (VPN) (Correct)
Ref: Cyber Awareness Challenge 2025 / Telework and Home Computer Security
Which of the following is true of spillage?
It can be either inadvertent or intentional. (Correct)
Ref: Cyber Awareness Challenge 2025 / Spillage
Which of the following would work in combination for two-factor authentication?
Common Access Card (CAC) and Personal Identification Number (PIN) (Correct)
Ref: Cyber Awareness Challenge 2025 / Identity Authentication