100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

US Navy Cyber Awareness Challenge 2025/2026 Study Guide

Rating
-
Sold
-
Pages
14
Grade
A+
Uploaded on
18-10-2025
Written in
2025/2026

US Navy Cyber Awareness Challenge 2025/2026 Study Guide Module 1: The Evolving Cyber Threat Landscape & Social Engineering 1. What is the primary goal of most cyber adversaries targeting the DoD?  ANSWER To steal sensitive information, disrupt operations, or degrade combat capabilities. 2. What is Social Engineering?  ANSWER A manipulation technique that exploits human error to gain private information, access, or valuables. 3. Which of the following is a common social engineering tactic that involves a fraudulent text message?  ANSWER Smishing (SMS Phishing). 4. You receive an urgent email from your "Commanding Officer" stating they are stuck in a meeting and need you to purchase gift cards for a ceremony. What is this?  ANSWER A phishing attempt, specifically a form of impersonation and urgency scam. 5. What is Vishing?  ANSWER Voice phishing; a social engineering attack conducted over the phone. 6. How can you best verify a request that seems unusual, even if it appears to come from a superior?  ANSWER Use a verified, pre-established contact method (like a known phone number or in-person) to confirm the request. 7. What is "Pretexting" in social engineering?  ANSWER Creating a fabricated scenario (the pretext) to steal a victim's personal information. 8. You see a USB drive labeled "2025 Sailor Evaluations" in the parking lot. What should you do?  ANSWER Do not plug it into any computer. Immediately give it to your unit's Cybersecurity Officer. 9. What is a key indicator of a phishing email?  ANSWER Poor grammar and spelling, a sense of urgency, generic greetings, and suspicious sender addresses. 10. What should you do immediately if you click on a link in a suspicious email?  ANSWER Disconnect your device from the network (unplug Ethernet and disable WiFi/Bluetooth) and report the incident immediately. Module 2: Classified Information and Data Spillage 11. What is Data Spillage?  ANSWER The transfer of classified or sensitive information onto a non-authorized system or network. 12. What is the first thing you must do if you suspect a data spillage has occurred?  ANSWER Immediately notify your Chain of Command and your Information System Security Manager (ISSM). 13. What is the maximum period of time that classified information can be left unattended?  ANSWER Classified information must be under constant supervision by an authorized individual.

Show more Read less
Institution
US Navy Cyber Awareness Challenge 2025
Course
US Navy Cyber Awareness Challenge 2025









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
US Navy Cyber Awareness Challenge 2025
Course
US Navy Cyber Awareness Challenge 2025

Document information

Uploaded on
October 18, 2025
Number of pages
14
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

US Navy Cyber Awareness Challenge
2025/2026 Study Guide

Module 1: The Evolving Cyber Threat Landscape & Social
Engineering
1. What is the primary goal of most cyber adversaries targeting the DoD?

 ANSWER ✓ To steal sensitive information, disrupt operations, or degrade combat
capabilities.

2. What is Social Engineering?

 ANSWER ✓ A manipulation technique that exploits human error to gain private
information, access, or valuables.

3. Which of the following is a common social engineering tactic that involves a
fraudulent text message?

 ANSWER ✓ Smishing (SMS Phishing).

4. You receive an urgent email from your "Commanding Officer" stating they are
stuck in a meeting and need you to purchase gift cards for a ceremony. What is
this?

 ANSWER ✓ A phishing attempt, specifically a form of impersonation and urgency scam.

5. What is Vishing?

 ANSWER ✓ Voice phishing; a social engineering attack conducted over the phone.

6. How can you best verify a request that seems unusual, even if it appears to
come from a superior?

 ANSWER ✓ Use a verified, pre-established contact method (like a known phone number
or in-person) to confirm the request.

7. What is "Pretexting" in social engineering?

,  ANSWER ✓ Creating a fabricated scenario (the pretext) to steal a victim's personal
information.

8. You see a USB drive labeled "2025 Sailor Evaluations" in the parking lot. What
should you do?

 ANSWER ✓ Do not plug it into any computer. Immediately give it to your unit's
Cybersecurity Officer.

9. What is a key indicator of a phishing email?

 ANSWER ✓ Poor grammar and spelling, a sense of urgency, generic greetings, and
suspicious sender addresses.

10. What should you do immediately if you click on a link in a suspicious email?

 ANSWER ✓ Disconnect your device from the network (unplug Ethernet and disable Wi-
Fi/Bluetooth) and report the incident immediately.


Module 2: Classified Information and Data Spillage
11. What is Data Spillage?

 ANSWER ✓ The transfer of classified or sensitive information onto a non-authorized
system or network.

12. What is the first thing you must do if you suspect a data spillage has occurred?

 ANSWER ✓ Immediately notify your Chain of Command and your Information System
Security Manager (ISSM).

13. What is the maximum period of time that classified information can be left
unattended?

 ANSWER ✓ Classified information must be under constant supervision by an authorized
individual.

14. You need to discuss classified information. What is the proper environment?

 ANSWER ✓ In a Secure Compartmented Information Facility (SCIF) or an area approved
for classified discussions.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
SmartscoreAaron Chicago State University
View profile
Follow You need to be logged in order to follow users or courses
Sold
43
Member since
1 year
Number of followers
3
Documents
3261
Last sold
1 hour ago
SMARTSCORES LIBRARY

Get top-tier academic support for Psychology, Nursing, Business, Engineering, HRM, Math, and more. Our team of professional tutors delivers high-quality homework, quiz, and exam assistance—ensuring scholarly excellence and grade-boosting results. Trust our collaborative expertise to help you succeed in any course at U.S.A Institutions.

3.8

4 reviews

5
2
4
1
3
0
2
0
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions