Which of the following is true of compressed URLs (e.g., TinyURL, goo.gl)? - correct answer
They may be used to mask malicious intent. (Correct)
Ref: Cyber Awareness Challenge 2025 / Compressed URLs
What is a best practice for creating user accounts for your home computer? - correct answer
Create separate accounts for each user and have each user create their own password.
(Correct)
Ref: Cyber Awareness Challenge 2025 / Best Practices for Home Computer Security
Which of the following is a best practice to protect your identity? - correct answer Ask how
information will be used before giving it out. (Correct)
Ref: Cyber Awareness Challenge 2025 / Identity Protection
John receives an e-mail about a potential shutdown of a major social service unless a petition
receives enough signatures. Which of the following actions should John NOT take with the e-
mail? - correct answer Forward it (Correct)
Ref: Cyber Awareness Challenge 2025 / Phishing
Which of the following is an appropriate use of government e-mail? - correct answer Using a
digital signature when sending hyperlinks (Correct)
Ref: Cyber Awareness Challenge 2025 / Use of Government E-mail
Steve occasionally runs errands during virtual meetings. He joins the meetings using his
approved government device. Does this pose a security concern? - correct answer Yes.
Eavesdroppers may be listening to Steve's conversation (Correct)
Ref: Common Sense
How can you prevent viruses and malicious code? - correct answer Scan all e-mail attachments
(Correct)
, Ref: Cyber Awareness Challenge 2025 / Protecting Against Malicious Code
Matt is a government employee who needs to share a document containing source selection
data with his supervisor. Which of the following describes the most appropriate way for Matt to
do this? - correct answer Encrypt it and send it via digitally signed Government e-mail. (Correct)
Ref: Cyber Awareness Challenge 2025 / Protecting PII/PHI
You receive an e-mail with a link to run an anti-virus scan. Your IT department has not sent links
like this in the past. The e-mail is not digitally signed. What action should you take? - correct
answer Report the e-mail to your security POC or help desk. (Correct)
Ref: Cyber Awareness Challenge 2025 / Phishing
Which of the following is a way to protect classified data? - correct answer Store it in a GSA-
approved container. (Correct)
Ref: Cyber Awareness Challenge 2025 / Protecting Classified Data
How can you protect yourself from identity theft? - correct answer Review your credit report
annually. (Correct)
Ref: Cyber Awareness Challenge 2025 / Identity Protection
How can you protect your home computer? - correct answer Use legitimate, known antivirus
software (Correct)
Install spyware protection software. (Correct)
Ref: Cyber Awareness Challenge 2025 / Best Practices for Home Computer Security
Which of the following poses a security risk while teleworking in an environment where
Internet of Things (IoT) devices are present? - correct answer All of these. (Correct)
Ref: Cyber Awareness Challenge 2025 / Internet of Things (IoT)