CYBER AWARENESS CHALLENGE
“Cyber Awareness Challenge:
Comprehensive Training for Digital
Security”
How can you protect your home computer? ✔✔Turn on the password feature
Carl receives an e-mail about a potential health risk... ✔✔Forward it
Which of the following is an appropriate use of government e-mail? ✔✔Using a digital
signature when sending attachments
Sylvia commutes to work via public transportation. She often uses... ✔✔Yes. Eavesdroppers
may be listening to Sylvia's phone calls, and shoulder surfers may be looking at her screen.
Which of the following is true of transmitting or transporting SCI? ✔✔Printed SCI must be
retrieved promptly from the printer
What conditions are necessary to be granted access to SCI? ✔✔Top Secret clearance and
indoctrination into the SCI program
Terry sees a post on her social media feed that says there is smoke billowing from the
Pentagon... ✔✔This is probably a post designed to attract Terr's attention to click on a link and
steal her information
Which of the following statements about PHI is false? ✔✔It is created or received by a
healthcare provider, health plan, or employer of a business associate of these.
, Which of the following is NOT a best practice for protecting your home wireless network for
telework? ✔✔Use your router's pre-set SSID and password
Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a security risk?
✔✔Yes, there is a risk that the signal could be intercepted and altered
How can you prevent viruses and malicious code? ✔✔Scan all external files before uploading to
your computer
Which of the following is an example of behavior that you should report? ✔✔Taking sensitive
information home for telework without authorization
You receive a text message from a package shipper notifying you that your package delivery is
delayed due to needing updated delivery instructions from you. ✔✔Delete the message
Which of the following is an appropriate use of a DoD PKI token? ✔✔Do not use a token
approved for NIPR on SIPR
Which of the following is a best practice when browsing the internet? ✔✔Only accept cookies
from reputable, trusted websites
Where are you permitted to use classified data? ✔✔Only in areas with security appropriate to
the classification level
Which of the following contributes to your online identity? ✔✔All of these
How can you protect your home computer? ✔✔Regularly back up your files
“Cyber Awareness Challenge:
Comprehensive Training for Digital
Security”
How can you protect your home computer? ✔✔Turn on the password feature
Carl receives an e-mail about a potential health risk... ✔✔Forward it
Which of the following is an appropriate use of government e-mail? ✔✔Using a digital
signature when sending attachments
Sylvia commutes to work via public transportation. She often uses... ✔✔Yes. Eavesdroppers
may be listening to Sylvia's phone calls, and shoulder surfers may be looking at her screen.
Which of the following is true of transmitting or transporting SCI? ✔✔Printed SCI must be
retrieved promptly from the printer
What conditions are necessary to be granted access to SCI? ✔✔Top Secret clearance and
indoctrination into the SCI program
Terry sees a post on her social media feed that says there is smoke billowing from the
Pentagon... ✔✔This is probably a post designed to attract Terr's attention to click on a link and
steal her information
Which of the following statements about PHI is false? ✔✔It is created or received by a
healthcare provider, health plan, or employer of a business associate of these.
, Which of the following is NOT a best practice for protecting your home wireless network for
telework? ✔✔Use your router's pre-set SSID and password
Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a security risk?
✔✔Yes, there is a risk that the signal could be intercepted and altered
How can you prevent viruses and malicious code? ✔✔Scan all external files before uploading to
your computer
Which of the following is an example of behavior that you should report? ✔✔Taking sensitive
information home for telework without authorization
You receive a text message from a package shipper notifying you that your package delivery is
delayed due to needing updated delivery instructions from you. ✔✔Delete the message
Which of the following is an appropriate use of a DoD PKI token? ✔✔Do not use a token
approved for NIPR on SIPR
Which of the following is a best practice when browsing the internet? ✔✔Only accept cookies
from reputable, trusted websites
Where are you permitted to use classified data? ✔✔Only in areas with security appropriate to
the classification level
Which of the following contributes to your online identity? ✔✔All of these
How can you protect your home computer? ✔✔Regularly back up your files