100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

DOD CYBER AWARENESS CHALLENGE KNOWLEDGE CHECK TEST QUIDE QUESTIONS AND ANSWERS

Rating
-
Sold
-
Pages
6
Uploaded on
18-01-2026
Written in
2025/2026

DOD CYBER AWARENESS CHALLENGE KNOWLEDGE CHECK TEST QUIDE QUESTIONS AND ANSWERS

Institution
DOD Cyber Awareness
Course
DOD Cyber Awareness









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
DOD Cyber Awareness
Course
DOD Cyber Awareness

Document information

Uploaded on
January 18, 2026
Number of pages
6
Written in
2025/2026
Type
Exam (elaborations)
Contains
Unknown

Subjects

Content preview

DOD CYBER AWARENESS CHALLENGE
KNOWLEDGE CHECK TEST QUIDE
QUESTIONS AND ANSWERS
Matt is a government employee who needs to share a document containing source
selection data with his supervisor. Which of the following describes the most appropriate
way for Matt to do this? - ANSWER -Encrypt it and send it via digitally signed
Government e-mail. (Correct)

Ref: Cyber Awareness Challenge 2025 / Protecting PII/PHI

You receive an e-mail with a link to run an anti-virus scan. Your IT department has not
sent links like this in the past. The e-mail is not digitally signed. What action should you
take? - ANSWER -Report the e-mail to your security POC or help desk. (Correct)

Ref: Cyber Awareness Challenge 2025 / Phishing

Which of the following is a way to protect classified data? - ANSWER -Store it in a GSA-
approved container

How can you protect yourself from identity theft? - ANSWER -Review your credit report
annually

How can you protect your home computer? - ANSWER -Use legitimate, known antivirus
software (Correct)
Install spyware protection software. (Correct)

Ref: Cyber Awareness Challenge 2025 / Best Practices for Home Computer Security

Which of the following poses a security risk while teleworking in an environment where
Internet of Things (IoT) devices are present? - ANSWER -All of these.

Which of these is NOT a potential indicator that your device may be under a malicious
code attack? - ANSWER -An operating system update (Correct)

Ref: Cyber Awareness Challenge 2025 / Incident Indicators

What are the requirements for access to Sensitive Compartmented Information (SCI)? -
ANSWER -Top Secret clearance and indoctrination into the SCI program

Which of the following is an example of removable media? - ANSWER -Compact disc

, Which of the following is an example of behavior that you should report? - ANSWER -
Bringing a phone into a prohibited area

Which of the following is NOT an appropriate use of your Common Access Card (CAC)?
- ANSWER -Exchanging it for a visitor pass in another building. (Correct)

Ref: Cyber Awareness Challenge 2025 / CAC/PIV Card Protection

You receive a phone call from an unknown person asking for a directory name on your
government furnished laptop so that a software update can be made. Which course of
action should you take? - ANSWER -Document the interaction and contact your security
POC or help desk

How can you protect your home computer? - ANSWER -Install spyware protection
software

Which of the following is an appropriate use of a DoD Public Key Infrastructure (PKI)
token? - ANSWER -Only leave it in a system while actively using it for a PKI-required
task

Which of the following is true of compressed URLs (e.g., TinyURL, goo.gl)? - ANSWER
-They may be used to mask malicious intent

What is a best practice for creating user accounts for your home computer? - ANSWER
-Create separate accounts for each user and have each user create their own
password.

Which of the following is a best practice to protect your identity? - ANSWER -Ask how
information will be used before giving it out. (Correct)

Ref: Cyber Awareness Challenge 2025 / Identity Protection

John receives an e-mail about a potential shutdown of a major social service unless a
petition receives enough signatures. Which of the following actions should John NOT
take with the e-mail? - ANSWER -Forward it (Correct)

Ref: Cyber Awareness Challenge 2025 / Phishing

Which of the following is an appropriate use of government e-mail? - ANSWER -Using a
digital signature when sending hyperlinks

Steve occasionally runs errands during virtual meetings. He joins the meetings using his
approved government device. Does this pose a security concern? - ANSWER -Yes.
Eavesdroppers may be listening to Steve's conversation

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
biggdreamer Havard School
View profile
Follow You need to be logged in order to follow users or courses
Sold
250
Member since
2 year
Number of followers
68
Documents
18006
Last sold
5 days ago

4.0

38 reviews

5
22
4
4
3
6
2
2
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions