2
FY 2026 Cyber Awareness Challenge Knowledge Check Exam
|| || || || || || ||
with accurate detailed solutions
|| || || ||
What risk is posed by Internet of Things (IoT) devices? - ✔✔Their connectivity can be exploited
|| || || || || || || || || || || || || || || ||
as an attack vector to any other device on the same network.
|| || || || || || || || || || ||
Which of the following is an example of Protected Health Information (PHI)? - ✔✔An
|| || || || || || || || || || || || || ||
individual's medical records maintained by a healthcare provider. || || || || || || ||
What is a risk to Government systems posed by removable media? - ✔✔Their data storage and
|| || || || || || || || || || || || || || || ||
ability to connect to systems can lead to unintended transfers of information, such as introduction
|| || || || || || || || || || || || || || ||
of malicious code or spillage.
|| || || ||
How can you protect your home computer? - ✔✔Scan files for viruses.
|| || || || || || || || || || ||
Trisha receives an e-mail with a sensational rumor about a celebrity's personal life. Which of the
|| || || || || || || || || || || || || || || ||
following actions should Trisha NOT take with the e-mail? - ✔✔Forward it || || || || || || || || || || ||
While scrolling your social media feed, you are presented with a news article with an incendiary
|| || || || || || || || || || || || || || || ||
headline accompanied by a video. What should you consider before sharing this article? - ✔✔You
|| || || || || || || || || || || || || ||
should consider the source and whether this information appears elsewhere.
|| || || || || || || || || ||
Oscar is on official Government travel with a Government-issued laptop. While at the airport he
|| || || || || || || || || || || || || || ||
uses the laptop to work on a report containing controlled unclassified information (CUI). For
|| || || || || || || || || || || || || ||
connectivity, he uses his personal phone as a mobile hotspot. Are there any security concerns? - || || || || || || || || || || || || || || || ||
✔✔Yes. He should be vigilant for "shoulder surfing," where others may be able to view the
|| || || || || || || || || || || || || || || ||
information on his screen. || || ||
Which of the following is an example of a correct way to protect classified data? - ✔✔Andrea
|| || || || || || || || || || || || || || || || ||
verifies need-to-know and security eligibility before sharing classified information.
|| || || || || || || ||
FY 2026 Cyber Awareness Challenge Knowledge Check Exam
|| || || || || || ||
with accurate detailed solutions
|| || || ||
What risk is posed by Internet of Things (IoT) devices? - ✔✔Their connectivity can be exploited
|| || || || || || || || || || || || || || || ||
as an attack vector to any other device on the same network.
|| || || || || || || || || || ||
Which of the following is an example of Protected Health Information (PHI)? - ✔✔An
|| || || || || || || || || || || || || ||
individual's medical records maintained by a healthcare provider. || || || || || || ||
What is a risk to Government systems posed by removable media? - ✔✔Their data storage and
|| || || || || || || || || || || || || || || ||
ability to connect to systems can lead to unintended transfers of information, such as introduction
|| || || || || || || || || || || || || || ||
of malicious code or spillage.
|| || || ||
How can you protect your home computer? - ✔✔Scan files for viruses.
|| || || || || || || || || || ||
Trisha receives an e-mail with a sensational rumor about a celebrity's personal life. Which of the
|| || || || || || || || || || || || || || || ||
following actions should Trisha NOT take with the e-mail? - ✔✔Forward it || || || || || || || || || || ||
While scrolling your social media feed, you are presented with a news article with an incendiary
|| || || || || || || || || || || || || || || ||
headline accompanied by a video. What should you consider before sharing this article? - ✔✔You
|| || || || || || || || || || || || || ||
should consider the source and whether this information appears elsewhere.
|| || || || || || || || || ||
Oscar is on official Government travel with a Government-issued laptop. While at the airport he
|| || || || || || || || || || || || || || ||
uses the laptop to work on a report containing controlled unclassified information (CUI). For
|| || || || || || || || || || || || || ||
connectivity, he uses his personal phone as a mobile hotspot. Are there any security concerns? - || || || || || || || || || || || || || || || ||
✔✔Yes. He should be vigilant for "shoulder surfing," where others may be able to view the
|| || || || || || || || || || || || || || || ||
information on his screen. || || ||
Which of the following is an example of a correct way to protect classified data? - ✔✔Andrea
|| || || || || || || || || || || || || || || || ||
verifies need-to-know and security eligibility before sharing classified information.
|| || || || || || || ||