Challenge Exam Questions and
Answers | Latest Version | 2025/2026 |
Correct & Verified
Why is it important to use strong, unique passwords for DoD systems?
✔✔To prevent unauthorized access to sensitive data and networks.
What is considered sensitive information under DoD guidelines?
✔✔Information that could harm national security or privacy if disclosed.
What is the correct action when leaving your workstation unattended?
✔✔Lock your computer to prevent unauthorized access.
Why must you avoid using personal USB drives on DoD systems?
✔✔They may introduce malware or unauthorized data into the network.
What is a potential consequence of failing to follow cybersecurity policies?
✔✔Loss of access privileges, disciplinary action, or security breach.
1
,What should you do if your computer behaves unusually or freezes often?
✔✔Report the issue to your IT or cybersecurity office.
What does “social engineering” refer to in cybersecurity?
✔✔Manipulating people into revealing confidential information.
What is the safest way to share sensitive information electronically?
✔✔Use encrypted, approved DoD communication channels.
What should you check before clicking a link in an email?
✔✔Hover over the link to verify the actual web address before clicking.
Why are unauthorized software downloads prohibited on DoD systems?
✔✔They can introduce malware or create vulnerabilities in the network.
What is a “clean desk policy” in cybersecurity?
✔✔Keeping sensitive information and documents secured when not in use.
2
, What should you do with printed documents containing classified data?
✔✔Store them in approved secure containers when not in use.
Why must you avoid discussing classified information on personal devices?
✔✔Personal devices are not authorized or secure for classified discussions.
What is “two-factor authentication” used for?
✔✔Adding an extra layer of security to verify user identity.
When should you update your DoD password?
✔✔Whenever required by policy or if you suspect it has been compromised.
What is the safest way to access DoD systems remotely?
✔✔Through approved secure VPN connections.
What should you do if you accidentally send sensitive information to the wrong person?
✔✔Report the incident immediately to your security office.
3