Knowledge check Questions with
Accurate Answers
Which of the following is true of compressed URLs (e.g., TinyURL, goo.gl)? -
ANSWERSThey may be used to mask malicious intent
What is a best practice for creating user accounts for your home computer? -
ANSWERSCreate separate accounts for each user and have each user create their
own password.
Which of the following is a best practice to protect your identity? - ANSWERSAsk how
information will be used before giving it out. (Correct)
Ref: Cyber Awareness Challenge 2025 / Identity Protection
John receives an e-mail about a potential shutdown of a major social service unless a
petition receives enough signatures. Which of the following actions should John NOT
take with the e-mail? - ANSWERSForward it (Correct)
Ref: Cyber Awareness Challenge 2025 / Phishing
Which of the following is an appropriate use of government e-mail? - ANSWERSUsing a
digital signature when sending hyperlinks
Steve occasionally runs errands during virtual meetings. He joins the meetings using his
approved government device. Does this pose a security concern? - ANSWERSYes.
Eavesdroppers may be listening to Steve's conversation
How can you prevent viruses and malicious code? - ANSWERSScan all e-mail
attachments (Correct)
Ref: Cyber Awareness Challenge 2025 / Protecting Against Malicious Code
Matt is a government employee who needs to share a document containing source
selection data with his supervisor. Which of the following describes the most appropriate
way for Matt to do this? - ANSWERSEncrypt it and send it via digitally signed
Government e-mail. (Correct)
Ref: Cyber Awareness Challenge 2025 / Protecting PII/PHI
, You receive an e-mail with a link to run an anti-virus scan. Your IT department has not
sent links like this in the past. The e-mail is not digitally signed. What action should you
take? - ANSWERSReport the e-mail to your security POC or help desk. (Correct)
Ref: Cyber Awareness Challenge 2025 / Phishing
Which of the following is a way to protect classified data? - ANSWERSStore it in a GSA-
approved container
How can you protect yourself from identity theft? - ANSWERSReview your credit report
annually
How can you protect your home computer? - ANSWERSUse legitimate, known antivirus
software (Correct)
Install spyware protection software. (Correct)
Ref: Cyber Awareness Challenge 2025 / Best Practices for Home Computer Security
Which of the following poses a security risk while teleworking in an environment where
Internet of Things (IoT) devices are present? - ANSWERSAll of these.
Which of these is NOT a potential indicator that your device may be under a malicious
code attack? - ANSWERSAn operating system update (Correct)
Ref: Cyber Awareness Challenge 2025 / Incident Indicators
What are the requirements for access to Sensitive Compartmented Information (SCI)? -
ANSWERSTop Secret clearance and indoctrination into the SCI program
Which of the following is an example of removable media? - ANSWERSCompact disc
Which of the following is an example of behavior that you should report? -
ANSWERSBringing a phone into a prohibited area
Which of the following is NOT an appropriate use of your Common Access Card (CAC)?
- ANSWERSExchanging it for a visitor pass in another building. (Correct)
Ref: Cyber Awareness Challenge 2025 / CAC/PIV Card Protection
You receive a phone call from an unknown person asking for a directory name on your
government furnished laptop so that a software update can be made. Which course of
action should you take? - ANSWERSDocument the interaction and contact your security
POC or help desk
How can you protect your home computer? - ANSWERSInstall spyware protection
software