Cyber Awareness Challenge Exam WITH
Questions and Complete
Solutions/Verified Answers |Latest
Update 2-24-2025
Of the following, which is NOT a method to protect sensitive information? - ANSWER After work
hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not
present
There are many travel tips for mobile computing. Which of the following is NOT one? - ANSWER
When using a public device with a card reader, only use your DoD CAC to access unclassified
information
The use of webmail is - ANSWER is only allowed if the organization permits it
What is considered ethical use of the Government email system? - ANSWER Distributing
Company newsletter
Which of the following attacks target high ranking officials and executives? - ANSWER Whaling
What constitutes a strong password? - ANSWER all of the above
You are logged on to your unclassified computer and just received an encrypted email from a
co-worker. The email has an attachment whose name contains the word "secret". What
should you do? - ANSWER Contact your security POC right away
, Which is a way to protect against phishing attacks? - ANSWER Look for digital certificates
You receive an email from a company you have an account with. The email states your account
has been compromised and you are invited to click on the link in order to reset your password.
What action should you take? - ANSWER Notify security
You are having lunch at a local restaurant outside the installation, and you find a cd labeled
"favorite song". What should you do? - ANSWER Leave the cd where it is
How should you securely transport company information on a removable media? -
ANSWER Encrypt the removable media
Should you always label your removable media? - ANSWER Yes
Which of the following is NOT Protected Health Information (PHI)? - ANSWER Medical care
facility name
If authorized, what can be done on a work computer? - ANSWER Check personal email
Spear Phishing attacks commonly attempt to impersonate email from trusted entities. What
security device is used in email to verify the identity of sender? - ANSWER Digital Signatures
What type of security is "part of your responsibility" and "placed above all else?" - ANSWER
Physical
If your wireless device is improperly configured someone could gain control of the device? T/F -
ANSWER TRUE
Which of the following is a proper way to secure your CAC/PIV? - ANSWER Remove and take it
with you whenever you leave your workstation
Questions and Complete
Solutions/Verified Answers |Latest
Update 2-24-2025
Of the following, which is NOT a method to protect sensitive information? - ANSWER After work
hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not
present
There are many travel tips for mobile computing. Which of the following is NOT one? - ANSWER
When using a public device with a card reader, only use your DoD CAC to access unclassified
information
The use of webmail is - ANSWER is only allowed if the organization permits it
What is considered ethical use of the Government email system? - ANSWER Distributing
Company newsletter
Which of the following attacks target high ranking officials and executives? - ANSWER Whaling
What constitutes a strong password? - ANSWER all of the above
You are logged on to your unclassified computer and just received an encrypted email from a
co-worker. The email has an attachment whose name contains the word "secret". What
should you do? - ANSWER Contact your security POC right away
, Which is a way to protect against phishing attacks? - ANSWER Look for digital certificates
You receive an email from a company you have an account with. The email states your account
has been compromised and you are invited to click on the link in order to reset your password.
What action should you take? - ANSWER Notify security
You are having lunch at a local restaurant outside the installation, and you find a cd labeled
"favorite song". What should you do? - ANSWER Leave the cd where it is
How should you securely transport company information on a removable media? -
ANSWER Encrypt the removable media
Should you always label your removable media? - ANSWER Yes
Which of the following is NOT Protected Health Information (PHI)? - ANSWER Medical care
facility name
If authorized, what can be done on a work computer? - ANSWER Check personal email
Spear Phishing attacks commonly attempt to impersonate email from trusted entities. What
security device is used in email to verify the identity of sender? - ANSWER Digital Signatures
What type of security is "part of your responsibility" and "placed above all else?" - ANSWER
Physical
If your wireless device is improperly configured someone could gain control of the device? T/F -
ANSWER TRUE
Which of the following is a proper way to secure your CAC/PIV? - ANSWER Remove and take it
with you whenever you leave your workstation