100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

DOD Cyber Awareness Challenge 2025 Knowledge check Questions with Accurate Answers

Rating
-
Sold
-
Pages
6
Grade
A
Uploaded on
19-08-2025
Written in
2025/2026

Which of the following is true of compressed URLs (e.g., TinyURL, )? - ANSWERSThey may be used to mask malicious intent What is a best practice for creating user accounts for your home computer? - ANSWERSCreate separate accounts for each user and have each user create their own password. Which of the following is a best practice to protect your identity? - ANSWERSAsk how information will be used before giving it out. (Correct) Ref: Cyber Awareness Challenge 2025 / Identity Protection John receives an e-mail about a potential shutdown of a major social service unless a petition receives enough signatures. Which of the following actions should John NOT take with the e-mail? - ANSWERSForward it (Correct) Ref: Cyber Awareness Challenge 2025 / Phishing Which of the following is an appropriate use of government e-mail? - ANSWERSUsing a digital signature when sending hyperlinks Steve occasionally runs errands during virtual meetings. He joins the meetings using his approved government device. Does this pose a security concern? - ANSWERSYes. Eavesdroppers may be listening to Steve's conversation How can you prevent viruses and malicious code? - ANSWERSScan all e-mail attachments (Correct) Ref: Cyber Awareness Challenge 2025 / Protecting Against Malicious Code Matt is a government employee who needs to share a document containing source selection data with his supervisor. Which of the following describes the most appropriate way for Matt to do this? - ANSWERSEncrypt it and send it via digitally signed Government e-mail. (Correct) Ref: Cyber Awareness Challenge 2025 / Protecting PII/PHI

Show more Read less
Institution
DOD Cyber Awareness Challenge 2025 Knowledge Check
Course
DOD Cyber Awareness Challenge 2025 Knowledge check









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
DOD Cyber Awareness Challenge 2025 Knowledge check
Course
DOD Cyber Awareness Challenge 2025 Knowledge check

Document information

Uploaded on
August 19, 2025
Number of pages
6
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

DOD Cyber Awareness Challenge 2025
Knowledge check Questions with
Accurate Answers

Which of the following is true of compressed URLs (e.g., TinyURL, goo.gl)? -
ANSWERSThey may be used to mask malicious intent

What is a best practice for creating user accounts for your home computer? -
ANSWERSCreate separate accounts for each user and have each user create their
own password.

Which of the following is a best practice to protect your identity? - ANSWERSAsk how
information will be used before giving it out. (Correct)

Ref: Cyber Awareness Challenge 2025 / Identity Protection

John receives an e-mail about a potential shutdown of a major social service unless a
petition receives enough signatures. Which of the following actions should John NOT
take with the e-mail? - ANSWERSForward it (Correct)

Ref: Cyber Awareness Challenge 2025 / Phishing

Which of the following is an appropriate use of government e-mail? - ANSWERSUsing a
digital signature when sending hyperlinks

Steve occasionally runs errands during virtual meetings. He joins the meetings using his
approved government device. Does this pose a security concern? - ANSWERSYes.
Eavesdroppers may be listening to Steve's conversation

How can you prevent viruses and malicious code? - ANSWERSScan all e-mail
attachments (Correct)

Ref: Cyber Awareness Challenge 2025 / Protecting Against Malicious Code

Matt is a government employee who needs to share a document containing source
selection data with his supervisor. Which of the following describes the most appropriate
way for Matt to do this? - ANSWERSEncrypt it and send it via digitally signed
Government e-mail. (Correct)

Ref: Cyber Awareness Challenge 2025 / Protecting PII/PHI

, You receive an e-mail with a link to run an anti-virus scan. Your IT department has not
sent links like this in the past. The e-mail is not digitally signed. What action should you
take? - ANSWERSReport the e-mail to your security POC or help desk. (Correct)

Ref: Cyber Awareness Challenge 2025 / Phishing

Which of the following is a way to protect classified data? - ANSWERSStore it in a GSA-
approved container

How can you protect yourself from identity theft? - ANSWERSReview your credit report
annually

How can you protect your home computer? - ANSWERSUse legitimate, known antivirus
software (Correct)
Install spyware protection software. (Correct)

Ref: Cyber Awareness Challenge 2025 / Best Practices for Home Computer Security

Which of the following poses a security risk while teleworking in an environment where
Internet of Things (IoT) devices are present? - ANSWERSAll of these.

Which of these is NOT a potential indicator that your device may be under a malicious
code attack? - ANSWERSAn operating system update (Correct)

Ref: Cyber Awareness Challenge 2025 / Incident Indicators

What are the requirements for access to Sensitive Compartmented Information (SCI)? -
ANSWERSTop Secret clearance and indoctrination into the SCI program

Which of the following is an example of removable media? - ANSWERSCompact disc

Which of the following is an example of behavior that you should report? -
ANSWERSBringing a phone into a prohibited area

Which of the following is NOT an appropriate use of your Common Access Card (CAC)?
- ANSWERSExchanging it for a visitor pass in another building. (Correct)

Ref: Cyber Awareness Challenge 2025 / CAC/PIV Card Protection

You receive a phone call from an unknown person asking for a directory name on your
government furnished laptop so that a software update can be made. Which course of
action should you take? - ANSWERSDocument the interaction and contact your security
POC or help desk

How can you protect your home computer? - ANSWERSInstall spyware protection
software
$10.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
Brilliantscores1

Get to know the seller

Seller avatar
Brilliantscores1 West Virginia University
View profile
Follow You need to be logged in order to follow users or courses
Sold
3
Member since
1 year
Number of followers
0
Documents
1429
Last sold
3 months ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions