100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

US Navy Cyber Awareness Challenge 2025/2026 Study Guide

Puntuación
-
Vendido
-
Páginas
14
Grado
A+
Subido en
18-10-2025
Escrito en
2025/2026

US Navy Cyber Awareness Challenge 2025/2026 Study Guide Module 1: The Evolving Cyber Threat Landscape & Social Engineering 1. What is the primary goal of most cyber adversaries targeting the DoD?  ANSWER To steal sensitive information, disrupt operations, or degrade combat capabilities. 2. What is Social Engineering?  ANSWER A manipulation technique that exploits human error to gain private information, access, or valuables. 3. Which of the following is a common social engineering tactic that involves a fraudulent text message?  ANSWER Smishing (SMS Phishing). 4. You receive an urgent email from your "Commanding Officer" stating they are stuck in a meeting and need you to purchase gift cards for a ceremony. What is this?  ANSWER A phishing attempt, specifically a form of impersonation and urgency scam. 5. What is Vishing?  ANSWER Voice phishing; a social engineering attack conducted over the phone. 6. How can you best verify a request that seems unusual, even if it appears to come from a superior?  ANSWER Use a verified, pre-established contact method (like a known phone number or in-person) to confirm the request. 7. What is "Pretexting" in social engineering?  ANSWER Creating a fabricated scenario (the pretext) to steal a victim's personal information. 8. You see a USB drive labeled "2025 Sailor Evaluations" in the parking lot. What should you do?  ANSWER Do not plug it into any computer. Immediately give it to your unit's Cybersecurity Officer. 9. What is a key indicator of a phishing email?  ANSWER Poor grammar and spelling, a sense of urgency, generic greetings, and suspicious sender addresses. 10. What should you do immediately if you click on a link in a suspicious email?  ANSWER Disconnect your device from the network (unplug Ethernet and disable WiFi/Bluetooth) and report the incident immediately. Module 2: Classified Information and Data Spillage 11. What is Data Spillage?  ANSWER The transfer of classified or sensitive information onto a non-authorized system or network. 12. What is the first thing you must do if you suspect a data spillage has occurred?  ANSWER Immediately notify your Chain of Command and your Information System Security Manager (ISSM). 13. What is the maximum period of time that classified information can be left unattended?  ANSWER Classified information must be under constant supervision by an authorized individual.

Mostrar más Leer menos
Institución
US Navy Cyber Awareness Challenge 2025
Grado
US Navy Cyber Awareness Challenge 2025









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
US Navy Cyber Awareness Challenge 2025
Grado
US Navy Cyber Awareness Challenge 2025

Información del documento

Subido en
18 de octubre de 2025
Número de páginas
14
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

US Navy Cyber Awareness Challenge
2025/2026 Study Guide

Module 1: The Evolving Cyber Threat Landscape & Social
Engineering
1. What is the primary goal of most cyber adversaries targeting the DoD?

 ANSWER ✓ To steal sensitive information, disrupt operations, or degrade combat
capabilities.

2. What is Social Engineering?

 ANSWER ✓ A manipulation technique that exploits human error to gain private
information, access, or valuables.

3. Which of the following is a common social engineering tactic that involves a
fraudulent text message?

 ANSWER ✓ Smishing (SMS Phishing).

4. You receive an urgent email from your "Commanding Officer" stating they are
stuck in a meeting and need you to purchase gift cards for a ceremony. What is
this?

 ANSWER ✓ A phishing attempt, specifically a form of impersonation and urgency scam.

5. What is Vishing?

 ANSWER ✓ Voice phishing; a social engineering attack conducted over the phone.

6. How can you best verify a request that seems unusual, even if it appears to
come from a superior?

 ANSWER ✓ Use a verified, pre-established contact method (like a known phone number
or in-person) to confirm the request.

7. What is "Pretexting" in social engineering?

,  ANSWER ✓ Creating a fabricated scenario (the pretext) to steal a victim's personal
information.

8. You see a USB drive labeled "2025 Sailor Evaluations" in the parking lot. What
should you do?

 ANSWER ✓ Do not plug it into any computer. Immediately give it to your unit's
Cybersecurity Officer.

9. What is a key indicator of a phishing email?

 ANSWER ✓ Poor grammar and spelling, a sense of urgency, generic greetings, and
suspicious sender addresses.

10. What should you do immediately if you click on a link in a suspicious email?

 ANSWER ✓ Disconnect your device from the network (unplug Ethernet and disable Wi-
Fi/Bluetooth) and report the incident immediately.


Module 2: Classified Information and Data Spillage
11. What is Data Spillage?

 ANSWER ✓ The transfer of classified or sensitive information onto a non-authorized
system or network.

12. What is the first thing you must do if you suspect a data spillage has occurred?

 ANSWER ✓ Immediately notify your Chain of Command and your Information System
Security Manager (ISSM).

13. What is the maximum period of time that classified information can be left
unattended?

 ANSWER ✓ Classified information must be under constant supervision by an authorized
individual.

14. You need to discuss classified information. What is the proper environment?

 ANSWER ✓ In a Secure Compartmented Information Facility (SCIF) or an area approved
for classified discussions.
$16.39
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
SmartscoreAaron Chicago State University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
43
Miembro desde
1 año
Número de seguidores
3
Documentos
3261
Última venta
19 horas hace
SMARTSCORES LIBRARY

Get top-tier academic support for Psychology, Nursing, Business, Engineering, HRM, Math, and more. Our team of professional tutors delivers high-quality homework, quiz, and exam assistance—ensuring scholarly excellence and grade-boosting results. Trust our collaborative expertise to help you succeed in any course at U.S.A Institutions.

3.8

4 reseñas

5
2
4
1
3
0
2
0
1
1

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes