Challenge Training - Knowledge Check
Questions and Answers | Latest
Version | 2025/2026 | Correct & Verified
What action should you take when you suspect identity theft?
✔✔Report to the security office and monitor your accounts.
Why must you complete annual cybersecurity training?
✔✔To stay aware of evolving threats and maintain compliance.
What should you do with outdated media containing sensitive information?
✔✔Destroy it using approved methods like degaussing or shredding.
When is it appropriate to download apps on a DoD mobile device?
✔✔Only when they are approved by DoD authorities.
What is the correct response to a coworker bragging about bypassing security procedures?
✔✔Report the behavior to a supervisor or security manager.
1
, What is one method to recognize spear phishing?
✔✔Personalized details that appear legitimate but are suspicious.
Why is it important to review email attachments before opening them?
✔✔They may contain malware disguised as legitimate files.
What should you do before sharing files through cloud storage?
✔✔Confirm it is an approved and secure DoD service.
Why should you not reuse passwords across accounts?
✔✔It increases risk if one account is compromised.
What should you do if a foreign national asks for details about your work?
✔✔Politely decline and report the contact to your security office.
How can you ensure mobile device security?
✔✔Use strong passcodes and enable device encryption.
2