Department of Defense (DoD) Cyber Awareness Challenge 2024 (1 hr) (
Test)
1. Combine it with info from other data sources to learn how to best bait you with a
scam: How can an adversary use information available in public records totarget you?
2. d+Uf_4RimUz: Which of the following is an example of a strong password?
3. Only in areas with security appropriate to the classification level: Where are you
permitted to use classified data?
4. special access authorization and indoctrination into the SCI program: What
conditions are necessary to be granted access to SCI?
5. Do not travel with a mobile device if you can avoid it: Which of the followingis
NOT a best practice for travelling overseas with a mobile device?
6. CPCON 2: Under which Cyberspace Protection Condition (CPCON) is the priorityfocus
limited to critical and essential functions?
7. Using his home computer to print the report while teleworking: Tom is working on
a report that contains employees names, home addresses, and salary.Which of the
following is Tom prohibited from doing with the report?
8. encrypting data stored on removable media: Which of the following uses of
removable media is appropriate?
9. Disable auto screen locking after a period of inactivity: Which of the followingis NOT
a best practice for protecting data on a mobile device?
10. Order a credit report annually: Which of the following is a best practice to
protect your identity?
11. An authorized Government-owned PED: Which of the following is permitted
within a SCIF?
12. Only accept cookies from reputable, trusted websites: Which of the followingis a best
practice when browsing the internet?
13. All of these: Which of the following is a risk associated with removable media?
14. A notification of a system update that has been publicized: Which of theseis NOT a
potential indicator that your device may be under a malicious code attack?
15. Delete the message: You receive a text message from a package shipper notifying you
that your package delivery is delayed due to needing updated deliveryinstructions from you.
It provides a shortened link for you to provide the needed info.You are not expecting a
package. What is the best course of action?
16. Certificates for identification, encryption and digital signature: What doesthe
CAC contain?
17. scan all external files before uploading to your computer: How can youprevent
viruses and malicious code?
18. Secret: Which type of data could reasonably be expected to cause seriousdamage
to national security?
1/2
Test)
1. Combine it with info from other data sources to learn how to best bait you with a
scam: How can an adversary use information available in public records totarget you?
2. d+Uf_4RimUz: Which of the following is an example of a strong password?
3. Only in areas with security appropriate to the classification level: Where are you
permitted to use classified data?
4. special access authorization and indoctrination into the SCI program: What
conditions are necessary to be granted access to SCI?
5. Do not travel with a mobile device if you can avoid it: Which of the followingis
NOT a best practice for travelling overseas with a mobile device?
6. CPCON 2: Under which Cyberspace Protection Condition (CPCON) is the priorityfocus
limited to critical and essential functions?
7. Using his home computer to print the report while teleworking: Tom is working on
a report that contains employees names, home addresses, and salary.Which of the
following is Tom prohibited from doing with the report?
8. encrypting data stored on removable media: Which of the following uses of
removable media is appropriate?
9. Disable auto screen locking after a period of inactivity: Which of the followingis NOT
a best practice for protecting data on a mobile device?
10. Order a credit report annually: Which of the following is a best practice to
protect your identity?
11. An authorized Government-owned PED: Which of the following is permitted
within a SCIF?
12. Only accept cookies from reputable, trusted websites: Which of the followingis a best
practice when browsing the internet?
13. All of these: Which of the following is a risk associated with removable media?
14. A notification of a system update that has been publicized: Which of theseis NOT a
potential indicator that your device may be under a malicious code attack?
15. Delete the message: You receive a text message from a package shipper notifying you
that your package delivery is delayed due to needing updated deliveryinstructions from you.
It provides a shortened link for you to provide the needed info.You are not expecting a
package. What is the best course of action?
16. Certificates for identification, encryption and digital signature: What doesthe
CAC contain?
17. scan all external files before uploading to your computer: How can youprevent
viruses and malicious code?
18. Secret: Which type of data could reasonably be expected to cause seriousdamage
to national security?
1/2