CYBER AWARENESS CHALLENGE.
EXAM 2025/2026 QUESTIONS AND
ANSWERS 100% PASS
How can you protect your home computer? - ANS Turn on the password feature
Carl receives an e-mail about a potential health risk... - ANS Forward it
Which of the following is an appropriate use of government e-mail? - ANS Using a digital
signature when sending attachments
Sylvia commutes to work via public transportation. She often uses... - ANS Yes.
Eavesdroppers may be listening to Sylvia's phone calls, and shoulder surfers may be looking at
her screen.
Which of the following is true of transmitting or transporting SCI? - ANS Printed SCI must be
retrieved promptly from the printer
What conditions are necessary to be granted access to SCI? - ANS Top Secret clearance and
indoctrination into the SCI program
Terry sees a post on her social media feed that says there is smoke billowing from the
Pentagon... - ANS This is probably a post designed to attract Terr's attention to click on a link
and steal her information
1 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED
, Which of the following statements about PHI is false? - ANS It is created or received by a
healthcare provider, health plan, or employer of a business associate of these.
Which of the following is NOT a best practice for protecting your home wireless network for
telework? - ANS Use your router's pre-set SSID and password
Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a security risk?
- ANS Yes, there is a risk that the signal could be intercepted and altered
How can you prevent viruses and malicious code? - ANS Scan all external files before
uploading to your computer
Which of the following is an example of behavior that you should report? - ANS Taking
sensitive information home for telework without authorization
You receive a text message from a package shipper notifying you that your package delivery is
delayed due to needing updated delivery instructions from you. - ANS Delete the message
Which of the following is an appropriate use of a DoD PKI token? - ANS Do not use a token
approved for NIPR on SIPR
Which of the following is a best practice when browsing the internet? - ANS Only accept
cookies from reputable, trusted websites
Where are you permitted to use classified data? - ANS Only in areas with security
appropriate to the classification level
Which of the following contributes to your online identity? - ANS All of these
How can you protect your home computer? - ANS Regularly back up your files
2 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED
EXAM 2025/2026 QUESTIONS AND
ANSWERS 100% PASS
How can you protect your home computer? - ANS Turn on the password feature
Carl receives an e-mail about a potential health risk... - ANS Forward it
Which of the following is an appropriate use of government e-mail? - ANS Using a digital
signature when sending attachments
Sylvia commutes to work via public transportation. She often uses... - ANS Yes.
Eavesdroppers may be listening to Sylvia's phone calls, and shoulder surfers may be looking at
her screen.
Which of the following is true of transmitting or transporting SCI? - ANS Printed SCI must be
retrieved promptly from the printer
What conditions are necessary to be granted access to SCI? - ANS Top Secret clearance and
indoctrination into the SCI program
Terry sees a post on her social media feed that says there is smoke billowing from the
Pentagon... - ANS This is probably a post designed to attract Terr's attention to click on a link
and steal her information
1 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED
, Which of the following statements about PHI is false? - ANS It is created or received by a
healthcare provider, health plan, or employer of a business associate of these.
Which of the following is NOT a best practice for protecting your home wireless network for
telework? - ANS Use your router's pre-set SSID and password
Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a security risk?
- ANS Yes, there is a risk that the signal could be intercepted and altered
How can you prevent viruses and malicious code? - ANS Scan all external files before
uploading to your computer
Which of the following is an example of behavior that you should report? - ANS Taking
sensitive information home for telework without authorization
You receive a text message from a package shipper notifying you that your package delivery is
delayed due to needing updated delivery instructions from you. - ANS Delete the message
Which of the following is an appropriate use of a DoD PKI token? - ANS Do not use a token
approved for NIPR on SIPR
Which of the following is a best practice when browsing the internet? - ANS Only accept
cookies from reputable, trusted websites
Where are you permitted to use classified data? - ANS Only in areas with security
appropriate to the classification level
Which of the following contributes to your online identity? - ANS All of these
How can you protect your home computer? - ANS Regularly back up your files
2 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED