As you browse a social media site, you come across photos of information with classified markings. What
should you do? - ansNotify your security point of contact. (Correct)
Ref: Cyber Awareness Challenge 2025 / Responding to Spillage
Based on the description provided, how many insider threat indicators are present? Edward has worked for the
DoD agency for 2 years. He is an analyst who takes a great deal of interest in his work. He occasionally takes a
somewhat aggressive interest in others' work as well, including asking for classified details of their projects. He
otherwise gets along well with his colleagues. - ans1-2 (Unsure)
Ref: Cyber Awareness Challenge 2025 / Detecting Insider Threats
Does it pose a risk to tap your smartwatch to pay for a purchase at a store? - ansOnly if you do not have two-
factor authentication enables on your linked phone
How can you prevent viruses and malicious code? - ansScan all e-mail attachments (Correct)
Ref: Cyber Awareness Challenge 2025 / Protecting Against Malicious Code
How can you protect a mobile device while traveling? - ansConnect with a Government VPN. (Correct)
Ref: Cyber Awareness Challenge 2025 / Traveling with Mobile Devices
How can you protect data on a mobile device? - ansUse two-factor authentication
How can you protect your home computer? - ansInstall spyware protection software
, How can you protect your home computer? - ansUse legitimate, known antivirus software (Correct)
Install spyware protection software. (Correct)
Ref: Cyber Awareness Challenge 2025 / Best Practices for Home Computer Security
How can you protect yourself from identity theft? - ansReview your credit report annually
How can you protect yourself on social networking sites? - ansValidate connection requests through another
source if possible. (Correct)
Ref: Cyber Awareness Challenge 2025 / Social Networking: Protect Yourself
John receives an e-mail about a potential shutdown of a major social service unless a petition receives enough
signatures. Which of the following actions should John NOT take with the e-mail? - ansForward it (Correct)
Ref: Cyber Awareness Challenge 2025 / Phishing
Matt is a government employee who needs to share a document containing source selection data with his
supervisor. Which of the following describes the most appropriate way for Matt to do this? - ansEncrypt it and
send it via digitally signed Government e-mail. (Correct)
Ref: Cyber Awareness Challenge 2025 / Protecting PII/PHI
Steve occasionally runs errands during virtual meetings. He joins the meetings using his approved government
device. Does this pose a security concern? - ansYes. Eavesdroppers may be listening to Steve's conversation
Tessa is processing payroll data that includes employees' names, home addresses, and salary. Which of the
following is Tessa prohibited from doing with the data? - ansUsing her home computer to print the data while
working remotely. (Correct)