2
Cyber Awareness Challenge 2026 Exam with precise detailed || || || || || || || ||
solutions
What is a Security Classification Guide?
|| || || || ||
A primary source for derivative classification
|| || || || ||
Based on the description provided, how many insider threat indicators are present?
|| || || || || || || || || || ||
Jean is a long-term government employee who recently transferred from one agency to another to
|| || || || || || || || || || || || || || ||
take a supervisory role. As part of her transition, Jean requires a higher level of access to sensitive
|| || || || || || || || || || || || || || || || || ||
information.
3+
Peter enters an empty conference room and finds a document with a Top Secret coversheet on it.
|| || || || || || || || || || || || || || || || ||
Peter has a Secret clearance. What should Peter do?
|| || || || || || || ||
Immediately notify his security POC and not handle the file || || || || || || || || ||
What risk is posed by Internet of Things (loT) devices?
|| || || || || || || || ||
Their connectivity can be exploited as an attack vector to any other device on the same network.
|| || || || || || || || || || || || || || || ||
Walter shares a link to a news article about the Department of Defense on his social media. Along
|| || || || || || || || || || || || || || || || || ||
with the link, he states that he disagrees with the reporting in the article as a DoD employee. Does
|| || || || || || || || || || || || || || || || || || ||
this pose a security concern?
|| || || ||
Yes. Walter should avoid appearing to speak on behalf of the Government.
|| || || || || || || || || || ||
, 2
Ed has authorized access to his agency's Sensitive Compartmented Information Facility (SCIF)
|| || || || || || || || || || || ||
and plans to work on a project there today. Which of the following can't he take into the SCIF?
|| || || || || || || || || || || || || || || || || ||
All of these || ||
What should you do with your badge within a Sensitive Compartmented
|| || || || || || || || || ||
Information Facility (SCIF)? || ||
Wear it visibly and above the waist|| || || || || ||
Evelyn is a system administrator at her agency. As part of her duties, she occasionally uses a
|| || || || || || || || || || || || || || || || ||
thumb drive to perform necessary system tasks, as outlined in her agency's procedures. The thumb
|| || || || || || || || || || || || || ||
drive is provided by the Government for this purpose. Is this an appropriate use of removable
|| || || || || || || || || || || || || || || || ||
media?
Yes. Only use removable media when operationally necessary, Government-owned, and approved
|| || || || || || || || || ||
in accordance with policy
|| || || ||
What consequence could you expect from modifying government equipment without
|| || || || || || || || || ||
authorization?
All of these || ||
While taking a break at your workstation, you switch to your computer's web browser intending
|| || || || || || || || || || || || || || ||
to look up the evening's weather forecast. You notice open tabs in your web browser that you don't
|| || || || || || || || || || || || || || || || ||
recall opening. Is this a concern?
|| || || || || ||
Yes. The appearance of new extensions or tabs in your web browser may indicate a cybersecurity
|| || || || || || || || || || || || || || || ||
incident
Cyber Awareness Challenge 2026 Exam with precise detailed || || || || || || || ||
solutions
What is a Security Classification Guide?
|| || || || ||
A primary source for derivative classification
|| || || || ||
Based on the description provided, how many insider threat indicators are present?
|| || || || || || || || || || ||
Jean is a long-term government employee who recently transferred from one agency to another to
|| || || || || || || || || || || || || || ||
take a supervisory role. As part of her transition, Jean requires a higher level of access to sensitive
|| || || || || || || || || || || || || || || || || ||
information.
3+
Peter enters an empty conference room and finds a document with a Top Secret coversheet on it.
|| || || || || || || || || || || || || || || || ||
Peter has a Secret clearance. What should Peter do?
|| || || || || || || ||
Immediately notify his security POC and not handle the file || || || || || || || || ||
What risk is posed by Internet of Things (loT) devices?
|| || || || || || || || ||
Their connectivity can be exploited as an attack vector to any other device on the same network.
|| || || || || || || || || || || || || || || ||
Walter shares a link to a news article about the Department of Defense on his social media. Along
|| || || || || || || || || || || || || || || || || ||
with the link, he states that he disagrees with the reporting in the article as a DoD employee. Does
|| || || || || || || || || || || || || || || || || || ||
this pose a security concern?
|| || || ||
Yes. Walter should avoid appearing to speak on behalf of the Government.
|| || || || || || || || || || ||
, 2
Ed has authorized access to his agency's Sensitive Compartmented Information Facility (SCIF)
|| || || || || || || || || || || ||
and plans to work on a project there today. Which of the following can't he take into the SCIF?
|| || || || || || || || || || || || || || || || || ||
All of these || ||
What should you do with your badge within a Sensitive Compartmented
|| || || || || || || || || ||
Information Facility (SCIF)? || ||
Wear it visibly and above the waist|| || || || || ||
Evelyn is a system administrator at her agency. As part of her duties, she occasionally uses a
|| || || || || || || || || || || || || || || || ||
thumb drive to perform necessary system tasks, as outlined in her agency's procedures. The thumb
|| || || || || || || || || || || || || ||
drive is provided by the Government for this purpose. Is this an appropriate use of removable
|| || || || || || || || || || || || || || || || ||
media?
Yes. Only use removable media when operationally necessary, Government-owned, and approved
|| || || || || || || || || ||
in accordance with policy
|| || || ||
What consequence could you expect from modifying government equipment without
|| || || || || || || || || ||
authorization?
All of these || ||
While taking a break at your workstation, you switch to your computer's web browser intending
|| || || || || || || || || || || || || || ||
to look up the evening's weather forecast. You notice open tabs in your web browser that you don't
|| || || || || || || || || || || || || || || || ||
recall opening. Is this a concern?
|| || || || || ||
Yes. The appearance of new extensions or tabs in your web browser may indicate a cybersecurity
|| || || || || || || || || || || || || || || ||
incident