US Navy Cyber Awareness Challenge 2025| Questions and Answers, 100% Correctly| Already Passed
US Navy Cyber Awareness Challenge 2025| Questions and Answers, 100% Correctly| Already Passed Which of the following is an example of behavior that you should report? -Planning an overseas vacation -Drinking alcohol socially -Expressing dislike of a recent Presidential action -Bringing a phone into a prohibited area Bringing a phone into a prohibited area You receive an e-mail with a link to run an anti-virus scan. Your IT department has not sent links like this in the past. The e-mail is not digitally signed. What action should you take? -Select the link to run the anti-virus scan. -Look for a phone number in the e-mail to call for more information. -Report the e-mail to your security POC or help desk. -Reply to the e-mail to request more information. Report the e-mail to your security POC or help desk. Which of the following is an example of a strong password? -bRobr@79I*P -Fluffy&Spot -Password12345 -1965May31! bRobr@79I*P Which of the following can be used to catalogue information about you? -Social networking sites -Audio-enabled digital assistants (e.g., Siri, Alexa) -Fitness trackers -All of these All of these Which of the following is a best practice to protect your identity? -Throw credit card and bank statement in the trash -Carry your passport with you at all times -Enable data aggregation on sites when possible -Ask how information will be used before giving it out Ask how information will be used before giving it out Which of the following describes Sensitive Compartmented Information (SCI)? -The requirement for access to SCI material are security clearance eligibility and need-to-know -SCI introduces an overlay of security to Top Secret, Secret, and Confidential information. -The determination that a piece of information is SCI is made at the organizational level. -SCI is a type of Controlled Unclassified Information (CUI). SCI introduces an overlay of security to Top Secret, Secret, and Confidential information. Which of the following is the safest to share on a social media networking site?
Written for
- Institution
- US Navy Cyber Awareness Challenge 2025
- Course
- US Navy Cyber Awareness Challenge 2025
Document information
- Uploaded on
- May 29, 2025
- Number of pages
- 46
- Written in
- 2024/2025
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
us navy cyber awareness challenge 2025
-
which of the following is an example of behavior t
-
you receive an e mail with a link to run an anti v
-
which of the following is an example of a strong p