PM
"DOD Cyber Awareness Challenge 2025: Stay Secure,
Stay Vigilant!"
1. A technician is installing a new wireless network and wants to secure
the wireless network to prevent untheorized access. Which of the
following protocols would be the MOST secure?
WPA
WPA2
WEP
SSID
2. If you are traveling abroad and need to access sensitive government
information, what should you do to ensure your mobile device
remains secure?
Turn off your device while traveling.
Access the information without any security measures.
Connect to a Government VPN before accessing
sensitive information.
Only use your device in public places.
3. Why does the DoD prohibit the use of removable media and portable
electronic devices (PEDs)?
They pose no security risks.
They cannot be adequately secured.
They are not compatible with government systems.
They are too expensive to maintain.
1/26
,2/24/25, 6:02 Cybersecurity Awareness
PM
4. Which of the following is the best practice to follow when creating new user
accounts?
Give users the default permissions and privileges.
Make users members of the administrator group so that they can do
their job.
Give users the least amount of permissions and privileges they
need to do their job.
Give users the maximum amount of privileges and permissions so they
can do their job
5. Why is it important to document suspicious interactions
regarding government equipment?
Documenting suspicious interactions helps maintain a record
for security investigations and alerts relevant personnel.
It is not necessary to document such interactions.
It helps in getting a faster response from IT support.
Documentation is only needed if a breach
occurs.
6. What type of device is allowed in a Sensitive Compartmented Information
Facility (SCIF)?
Non-government tablets
Personal laptops
Authorized Government-owned Portable Electronic Device (PED)
Smartphones from any manufacturer
7. If you receive an email that appears to be from your IT department asking
for your password to perform maintenance, what should you do based on
best practices?
2/26
, 2/24/25, 6:02 Cybersecurity Awareness
PM
Forward the email to your colleagues to warn them.
Do not respond to the email and report it to your security POC
or help desk.
Reply to the email with your password for verification.
Click on the link provided in the email to verify its authenticity.
8. Which of the following is considered a strong password?
RileyyeliR
paranoid4EVER
BL@k2V1.0.1
sword123
9. What is the recommended approach for managing user accounts on a home
computer?
Create one account for the administrator only. Allow
users to log in without a password.
Create separate accounts for each user and have each user
create their own password.
Use a single account for all users with a shared password.
10. What is one permitted use of government furnished equipment
(GFE)? Playing video games
E-mailing your
supervisor Personal
shopping online
Streaming movies
3/26