2025|2026
Which of the following is a best practice when browsing the internet - Correct
Answer ✔️✔️look for https in the URL name
Which of the following is an allowed use of government furnished equipment -
Correct Answer ✔️✔️emailing your supervisor
how do you protect data on a mobile device - Correct Answer ✔️✔️use 2
factor authentification
which of the following is true of transmitting or transporing SCI - Correct
Answer ✔️✔️you must be courier briefed for sci to transport it
which of the following poses a security risk while teleworking in an environemtn
where IOT devides are present - Correct Answer ✔️✔️all of these
how can you prevent viruses and malicious code - Correct Answer ✔️✔
️scan all email attachments
example of removable media - Correct Answer ✔️✔️compact disc
,which of the following is a best practice to protect your identity - Correct
Answer ✔️✔️ask how information will be used before giving it out
Which of these is not a potential indicator that your device may be under
malicious code attack - Correct Answer ✔️✔️operating system update
how can you protect your home computer - Correct Answer ✔️✔️install
spyware protection software
Which of the following is permitted within a sensitive compartmented
information facility SCIF? - Correct Answer ✔️✔️An authorized
Government-owned Portable Electronic Device (PED)
Type of data could reasonably be expected to cause damage to national
security? - Correct Answer ✔️✔️Top Secret
example of a strong password - Correct Answer ✔️✔️bBrobr@791*p
Which of the following is true of working within a sensitive compartmented
information facility SCIF - Correct Answer ✔️✔️badges must be worn
while in the facility and removed when leaving the facility
, Which of the following is true of compressed URLs (e.g., TinyURL, goo.gl)? -
Correct Answer ✔️✔️They may be used to mask malicious intent
What is a best practice for creating user accounts for your home computer? -
Correct Answer ✔️✔️Create separate accounts for each user and have
each user create their own password.
Which of the following is a best practice to protect your identity? - Correct
Answer ✔️✔️Ask how information will be used before giving it out.
(Correct)
Ref: Cyber Awareness Challenge 2025 / Identity Protection
John receives an e-mail about a potential shutdown of a major social service
unless a petition receives enough signatures. Which of the following actions
should John NOT take with the e-mail? - Correct Answer ✔️✔️Forward it
(Correct)
Ref: Cyber Awareness Challenge 2025 / Phishing