Which of the following is an example of behavior protect your identity?
that you should report?
-Throw credit card and bank statement in the
-Planning an overseas vacation trash
-Drinking alcohol socially -Carry your passport with you at all times
-Expressing dislike of a recent Presidential action -Enable data aggregation on sites when possible
-Bringing a phone into a prohibited area - -Ask how information will be used before giving it
ANSWERS - Bringing a phone into a out - ANSWERS - Ask how information will
prohibited area be used before giving it out
You receive an e-mail with a link to run an anti- Which of the following describes Sensitive
virus scan. Your IT department has not sent links Compartmented Information (SCI)?
like this in the past. The e-mail is not digitally
signed. What action should you take? -The requirement for access to SCI material are
security clearance eligibility and need-to-know
-Select the link to run the anti-virus scan. -SCI introduces an overlay of security to Top
-Look for a phone number in the e-mail to call for Secret, Secret, and Confidential information.
more information. -The determination that a piece of information is
-Report the e-mail to your security POC or help SCI is made at the organizational level.
desk. -SCI is a type of Controlled Unclassified
-Reply to the e-mail to request more information. Information (CUI). - ANSWERS - SCI
- ANSWERS - Report the e-mail to your introduces an overlay of security to Top Secret,
security POC or help desk. Secret, and Confidential information.
Which of the following is an example of a strong Which of the following is the safest to share on a
password? social media networking site?
-bRobr@79I*P -Your birthdate
-Fluffy&Spot -Your mother's maiden name
-Password12345 -Your favorite movie
-1965May31! - ANSWERS - bRobr@79I*P -Your current location - ANSWERS - Your
favorite movie
Which of the following can be used to catalogue
information about you? You receive a text message from a vendor
notifying you that your order is on hold due to
-Social networking sites needing updated payment information from you.
-Audio-enabled digital assistants (e.g., Siri, It provides a shortened link for you to provide the
Alexa) needed information. What is the best course of
-Fitness trackers action?
-All of these - ANSWERS - All of these
-Open the link to provide information
-Reply to the message and ask for more
Which of the following is a best practice to information
, US Navy Cyber Awareness Challenge Questions and Answers
-Delete the message
-Open the link to inspect the website - Which of the following is an allowed use of
ANSWERS - Delete the message government furnished equipment (GFE)?
-Conducting transactions on your side business
Which of these is NOT a potential indicator that -Viewing family photos from your shared
your device may be under a malicious code DropBox
attack? -Lending it to your spouse to watcha movie
-E-mailing your supervisor - ANSWERS - E-
-The device slows down mailing your supervisor
-Loss of control of the mouse or keyboard
-A strange pop-up during system startup
-An operating system update - ANSWERS - Which of the following is true of removable media
An operating system update and portable electronic devices (PEDs)?
-The risk associated with them may lead to loss
What is a best practice for creating user of life.
accounts for your home computer? -They cannot be adequately secured, so they are
prohibited by the DoD.
-Do not share your home computer with any -Removable media pose more risk than PEDs
other user and are not permitted in government facilities.
-Create separate accounts for each user and -Their utility outweighs any risk associated with
tailor each password wo what will be easy for the them. - ANSWERS - The risk associated
individual user to remember with them may lead to loss of life.
-Set up a generic user account with no password
for general user functions
-Create separate accounts for each user and Which of the following provides precise,
have each user create their own password - comprehensive guidance regarding specific
ANSWERS - Create separate accounts for program, system, operation, or weapon system
each user and have each user create their own elements of information to be classified?
password
-Classification Management Tool
-Local Security Official
Which of the following is permitted when using -Security Classification Guide
an unclassified laptop within a collateral -Classification Registry - ANSWERS -
classified space? Security Classification Guide
-A Government-issued wireless headset with a
microphone How can you protect data on a mobile device?
-A microphone embedded in the laptop
-A personally-owned wired headset without a -Use two-factor authentication
microphone -Store your data on a commercial cloud
-A Government-issued wireless headset without application
microphone - ANSWERS - A personally- -Disable automatic screen locking after a period
owned wired headset without a microphone of inactivity
-Turn over your device as requested by authority