FY 2026 CYBER AWARENESS
CHALLENGE KNOWLEDGE CHECK
TEST SET QUESTIONS AND ANSWERS
How can you identify the separation of Sensitive Compartmented Information (SCI)
classified material from collateral classified material? - ANSWER -Markings that identify
the compartment with which it is affiliated.
Which of the following is a best practice to protect your identity? - ANSWER -Monitor
your financial statements and credit reports.
Sara is a government employee with a high degree of expertise in her field. She
receives an e-mail from a foreign national that is complimentary of Sara's expertise and
seeks to make a connection with her to learn more about her work. What should Sara
do? - ANSWER -Report the contact to her security POC
Paula is compiling statistics on healthcare provided to Service members over the last
fiscal year. Some of her source data includes Protected Health Information (PHI). How
can she properly process this data? - ANSWER -Use an encrypted device that requires
a passcode or biometrics to unlock
On a Government-owned mobile device, what should you do before installing an
application? - ANSWER -Ensure that it is an approved and authorized application.
Evelyn is a system administrator at her agency. As part of her duties, she occasionally
uses a thumb drive to perform necessary system tasks, as outlined in her agency's
procedures. The thumb drive is provided by the Government for this purpose. Is this an
appropriate use of removable media? - ANSWER -Yes. Only use removable media
when operationally necessary, Government-owned, and approved in accordance with
policy
How should you approach a compressed URL, such as Tiny URL? - ANSWER -Preview
where the link leads before opening it.
In what level of system can you use a SIPRNet public key infrastructure (PKI) token? -
ANSWER -SIPRNet
What risk is posed by Internet of Things (IoT) devices? - ANSWER -Their connectivity
can be exploited as an attack vector to any other device on the same network.
Which of the following is an example of Protected Health Information (PHI)? - ANSWER
-An individual's medical records maintained by a healthcare provider.
CHALLENGE KNOWLEDGE CHECK
TEST SET QUESTIONS AND ANSWERS
How can you identify the separation of Sensitive Compartmented Information (SCI)
classified material from collateral classified material? - ANSWER -Markings that identify
the compartment with which it is affiliated.
Which of the following is a best practice to protect your identity? - ANSWER -Monitor
your financial statements and credit reports.
Sara is a government employee with a high degree of expertise in her field. She
receives an e-mail from a foreign national that is complimentary of Sara's expertise and
seeks to make a connection with her to learn more about her work. What should Sara
do? - ANSWER -Report the contact to her security POC
Paula is compiling statistics on healthcare provided to Service members over the last
fiscal year. Some of her source data includes Protected Health Information (PHI). How
can she properly process this data? - ANSWER -Use an encrypted device that requires
a passcode or biometrics to unlock
On a Government-owned mobile device, what should you do before installing an
application? - ANSWER -Ensure that it is an approved and authorized application.
Evelyn is a system administrator at her agency. As part of her duties, she occasionally
uses a thumb drive to perform necessary system tasks, as outlined in her agency's
procedures. The thumb drive is provided by the Government for this purpose. Is this an
appropriate use of removable media? - ANSWER -Yes. Only use removable media
when operationally necessary, Government-owned, and approved in accordance with
policy
How should you approach a compressed URL, such as Tiny URL? - ANSWER -Preview
where the link leads before opening it.
In what level of system can you use a SIPRNet public key infrastructure (PKI) token? -
ANSWER -SIPRNet
What risk is posed by Internet of Things (IoT) devices? - ANSWER -Their connectivity
can be exploited as an attack vector to any other device on the same network.
Which of the following is an example of Protected Health Information (PHI)? - ANSWER
-An individual's medical records maintained by a healthcare provider.