100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

DOD CYBER AWARENESS CHALLENGE KNOWLEDGE CHECK TEST QUIDE QUESTIONS AND ANSWERS

Puntuación
-
Vendido
-
Páginas
6
Subido en
18-01-2026
Escrito en
2025/2026

DOD CYBER AWARENESS CHALLENGE KNOWLEDGE CHECK TEST QUIDE QUESTIONS AND ANSWERS

Institución
DOD Cyber Awareness
Grado
DOD Cyber Awareness









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
DOD Cyber Awareness
Grado
DOD Cyber Awareness

Información del documento

Subido en
18 de enero de 2026
Número de páginas
6
Escrito en
2025/2026
Tipo
Examen
Contiene
Desconocido

Temas

Vista previa del contenido

DOD CYBER AWARENESS CHALLENGE
KNOWLEDGE CHECK TEST QUIDE
QUESTIONS AND ANSWERS
Matt is a government employee who needs to share a document containing source
selection data with his supervisor. Which of the following describes the most appropriate
way for Matt to do this? - ANSWER -Encrypt it and send it via digitally signed
Government e-mail. (Correct)

Ref: Cyber Awareness Challenge 2025 / Protecting PII/PHI

You receive an e-mail with a link to run an anti-virus scan. Your IT department has not
sent links like this in the past. The e-mail is not digitally signed. What action should you
take? - ANSWER -Report the e-mail to your security POC or help desk. (Correct)

Ref: Cyber Awareness Challenge 2025 / Phishing

Which of the following is a way to protect classified data? - ANSWER -Store it in a GSA-
approved container

How can you protect yourself from identity theft? - ANSWER -Review your credit report
annually

How can you protect your home computer? - ANSWER -Use legitimate, known antivirus
software (Correct)
Install spyware protection software. (Correct)

Ref: Cyber Awareness Challenge 2025 / Best Practices for Home Computer Security

Which of the following poses a security risk while teleworking in an environment where
Internet of Things (IoT) devices are present? - ANSWER -All of these.

Which of these is NOT a potential indicator that your device may be under a malicious
code attack? - ANSWER -An operating system update (Correct)

Ref: Cyber Awareness Challenge 2025 / Incident Indicators

What are the requirements for access to Sensitive Compartmented Information (SCI)? -
ANSWER -Top Secret clearance and indoctrination into the SCI program

Which of the following is an example of removable media? - ANSWER -Compact disc

, Which of the following is an example of behavior that you should report? - ANSWER -
Bringing a phone into a prohibited area

Which of the following is NOT an appropriate use of your Common Access Card (CAC)?
- ANSWER -Exchanging it for a visitor pass in another building. (Correct)

Ref: Cyber Awareness Challenge 2025 / CAC/PIV Card Protection

You receive a phone call from an unknown person asking for a directory name on your
government furnished laptop so that a software update can be made. Which course of
action should you take? - ANSWER -Document the interaction and contact your security
POC or help desk

How can you protect your home computer? - ANSWER -Install spyware protection
software

Which of the following is an appropriate use of a DoD Public Key Infrastructure (PKI)
token? - ANSWER -Only leave it in a system while actively using it for a PKI-required
task

Which of the following is true of compressed URLs (e.g., TinyURL, goo.gl)? - ANSWER
-They may be used to mask malicious intent

What is a best practice for creating user accounts for your home computer? - ANSWER
-Create separate accounts for each user and have each user create their own
password.

Which of the following is a best practice to protect your identity? - ANSWER -Ask how
information will be used before giving it out. (Correct)

Ref: Cyber Awareness Challenge 2025 / Identity Protection

John receives an e-mail about a potential shutdown of a major social service unless a
petition receives enough signatures. Which of the following actions should John NOT
take with the e-mail? - ANSWER -Forward it (Correct)

Ref: Cyber Awareness Challenge 2025 / Phishing

Which of the following is an appropriate use of government e-mail? - ANSWER -Using a
digital signature when sending hyperlinks

Steve occasionally runs errands during virtual meetings. He joins the meetings using his
approved government device. Does this pose a security concern? - ANSWER -Yes.
Eavesdroppers may be listening to Steve's conversation
$16.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
biggdreamer Havard School
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
250
Miembro desde
2 año
Número de seguidores
68
Documentos
18006
Última venta
5 días hace

4.0

38 reseñas

5
22
4
4
3
6
2
2
1
4

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes