Check Exam with All Correct & 100% Verified Answers |
Guaranteed to Pass
Which of the following is true of compressed URLs (e.g., TinyURL, goo.gl)? ✔Correct Answer-They
may be used to mask malicious intent
What is a best practice for creating user accounts for your home computer? ✔Correct Answer-
Create separate accounts for each user and have each user create their own password.
Which of the following is a best practice to protect your identity? ✔Correct Answer-Ask how
information will be used before giving it out. (Correct)
Ref: Cyber Awareness Challenge 2025 / Identity Protection
John receives an e-mail about a potential shutdown of a major social service unless a petition
receives enough signatures. Which of the following actions should John NOT take with the e-mail?
✔Correct Answer-Forward it (Correct)
Ref: Cyber Awareness Challenge 2025 / Phishing
Which of the following is an appropriate use of government e-mail? ✔Correct Answer-Using a
digital signature when sending hyperlinks
Steve occasionally runs errands during virtual meetings. He joins the meetings using his approved
government device. Does this pose a security concern? ✔Correct Answer-Yes. Eavesdroppers may
be listening to Steve's conversation
How can you prevent viruses and malicious code? ✔Correct Answer-Scan all e-mail attachments
(Correct)
Ref: Cyber Awareness Challenge 2025 / Protecting Against Malicious Code
Matt is a government employee who needs to share a document containing source selection data
with his supervisor. Which of the following describes the most appropriate way for Matt to do this?
✔Correct Answer-Encrypt it and send it via digitally signed Government e-mail. (Correct)
Ref: Cyber Awareness Challenge 2025 / Protecting PII/PHI
You receive an e-mail with a link to run an anti-virus scan. Your IT department has not sent links like
this in the past. The e-mail is not digitally signed. What action should you take? ✔Correct Answer-
Report the e-mail to your security POC or help desk. (Correct)
Ref: Cyber Awareness Challenge 2025 / Phishing
Which of the following is a way to protect classified data? ✔Correct Answer-Store it in a GSA-
approved container
, How can you protect yourself from identity theft? ✔Correct Answer-Review your credit report
annually
How can you protect your home computer? ✔Correct Answer-Use legitimate, known antivirus
software (Correct)
Install spyware protection software. (Correct)
Ref: Cyber Awareness Challenge 2025 / Best Practices for Home Computer Security
Which of the following poses a security risk while teleworking in an environment where Internet of
Things (IoT) devices are present? ✔Correct Answer-All of these.
Which of these is NOT a potential indicator that your device may be under a malicious code attack?
✔Correct Answer-An operating system update (Correct)
Ref: Cyber Awareness Challenge 2025 / Incident Indicators
What are the requirements for access to Sensitive Compartmented Information (SCI)? ✔Correct
Answer-Top Secret clearance and indoctrination into the SCI program
Which of the following is an example of removable media? ✔Correct Answer-Compact disc
Which of the following is an example of behavior that you should report? ✔Correct Answer-
Bringing a phone into a prohibited area
Which of the following is NOT an appropriate use of your Common Access Card (CAC)? ✔Correct
Answer-Exchanging it for a visitor pass in another building. (Correct)
Ref: Cyber Awareness Challenge 2025 / CAC/PIV Card Protection
You receive a phone call from an unknown person asking for a directory name on your government
furnished laptop so that a software update can be made. Which course of action should you take?
✔Correct Answer-Document the interaction and contact your security POC or help desk
How can you protect your home computer? ✔Correct Answer-Install spyware protection software
Which of the following is an appropriate use of a DoD Public Key Infrastructure (PKI) token?
✔Correct Answer-Only leave it in a system while actively using it for a PKI-required task
How can you protect yourself on social networking sites? ✔Correct Answer-Validate connection
requests through another source if possible. (Correct)
Ref: Cyber Awareness Challenge 2025 / Social Networking: Protect Yourself
How can you protect data on a mobile device? ✔Correct Answer-Use two-factor authentication
You receive an e-mail marked important from your agency head asking you to call them using a
number you do not recognize. The e-mail was sent from a personal e-mail address that you do not
recognize, but it addresses you by name. What action should you take? ✔Correct Answer-This may
be a spear phishing attempt. Report it to your security POC or help desk.