DOD CYBER AWARENESS
CHALLENGE EXAM REVIEW SET
QUESTIONS WITH CORRECT
ANSWERS
Which of the following is a best practice for physical security? - ANSWER -Hold the
door for coworkers you know when entering your facility
—> Controlled access with known individuals.
How do Insider Threat Programs defend against insider threats? - ANSWER -
Intervening early to help individuals with issues
—> Proactive mitigation prevents escalation.
What is a best practice for user accounts on your home computer? - ANSWER -Each
user should have their own account
—> Accountability and proper access control.
Which of the following is an example of two-factor authentication? - ANSWER -
Fingerprint and face identification (ID)
—> Biometric plus something you are/own aligns with 2FA concepts.
You receive a text message from a commercial shipping company notifying you that
they need an updated address to deliver a package to you. It provides a link for you to
provide the Information needed. What is the best course of action? - ANSWER -Open
the link
—> (Quiz logic) Verify legitimacy before acting; in real life, be cautious.
Which of the following is a best practice to protect your identity? - ANSWER -Monitor
your financial statements and credit reports
—> Early detection of identity theft is effective.
Which of the following is an allowed use of a government-furnished smartphone? -
ANSWER -Responding to e-mails on your government e-mail account
—> Maintains official communications channel.
CHALLENGE EXAM REVIEW SET
QUESTIONS WITH CORRECT
ANSWERS
Which of the following is a best practice for physical security? - ANSWER -Hold the
door for coworkers you know when entering your facility
—> Controlled access with known individuals.
How do Insider Threat Programs defend against insider threats? - ANSWER -
Intervening early to help individuals with issues
—> Proactive mitigation prevents escalation.
What is a best practice for user accounts on your home computer? - ANSWER -Each
user should have their own account
—> Accountability and proper access control.
Which of the following is an example of two-factor authentication? - ANSWER -
Fingerprint and face identification (ID)
—> Biometric plus something you are/own aligns with 2FA concepts.
You receive a text message from a commercial shipping company notifying you that
they need an updated address to deliver a package to you. It provides a link for you to
provide the Information needed. What is the best course of action? - ANSWER -Open
the link
—> (Quiz logic) Verify legitimacy before acting; in real life, be cautious.
Which of the following is a best practice to protect your identity? - ANSWER -Monitor
your financial statements and credit reports
—> Early detection of identity theft is effective.
Which of the following is an allowed use of a government-furnished smartphone? -
ANSWER -Responding to e-mails on your government e-mail account
—> Maintains official communications channel.