Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

DOD Cyber Awareness Challenge 2025 Knowledge check / Newest Actual Exam Q&A with Definitiv, Exams of Nursing

DOD Cyber Awareness Challenge 2025 Knowledge check / Newest Actual Exam Q&A with Definitive Answers & (Reference) A+ Score Solutions. Terms in this set (64) Quiz____? Which of the following is true of compressed URLs (e.g., TinyURL, goo.gl)? - Answerโœ“โœ“ They may be used to mask malicious intent. (Correct) Ref: Cyber Awareness Challenge 2025 / Compressed URLs Quiz____? What is a best practice for creating user accounts for your home computer? - Answerโœ“โœ“ Create separate accounts for each user and have each user create their own password. (Correct) Ref: Cyber Awareness Challenge 2025 / Best Practices for Home Computer Security Quiz____? Which of the following is a best practice to protect your identity? - Answerโœ“โœ“ Ask how information will be used before giving it out. (Correct) Ref: Cyber Awareness Challenge 2025 / Identity Protection

Typology: Exams

2024/2025

Available from 06/28/2025

Bestnurse0
Bestnurse0 ๐Ÿ‡บ๐Ÿ‡ธ

3

(6)

1.5K documents

1 / 25

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
1
Terms in this set (64)
Quiz____?
Which of the following is true of compressed URLs (e.g., TinyURL, goo.gl)? -
Answer
โœ“โœ“
They may be used to mask malicious intent. (Correct)
Ref: Cyber Awareness Challenge 2025 / Compressed URLs
Quiz____?
What is a best practice for creating user accounts for your home computer? -
Answer
โœ“โœ“
Create separate accounts for each user and have each user create their own password.
(Correct)
Ref: Cyber Awareness Challenge 2025 / Best Practices for Home Computer Security
Quiz____?
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19

Partial preview of the text

Download DOD Cyber Awareness Challenge 2025 Knowledge check / Newest Actual Exam Q&A with Definitiv and more Exams Nursing in PDF only on Docsity!

Terms in this set (64) Quiz____? Which of the following is true of compressed URLs (e.g., TinyURL, goo.gl)? -

Answer โœ“โœ“

They may be used to mask malicious intent. (Correct) Ref: Cyber Awareness Challenge 2025 / Compressed URLs Quiz____? What is a best practice for creating user accounts for your home computer? -

Answer โœ“โœ“

Create separate accounts for each user and have each user create their own password. (Correct) Ref: Cyber Awareness Challenge 2025 / Best Practices for Home Computer Security Quiz____?

Which of the following is a best practice to protect your identity? -

Answer โœ“โœ“

Ask how information will be used before giving it out. (Correct) Ref: Cyber Awareness Challenge 2025 / Identity Protection Quiz____? John receives an e-mail about a potential shutdown of a major social service unless a petition receives enough signatures. Which of the following actions should John NOT take with the e- mail? -

Answer โœ“โœ“

Forward it (Correct) Ref: Cyber Awareness Challenge 2025 / Phishing Quiz____? Which of the following is an appropriate use of government e-mail? -

Answer โœ“โœ“

Using a digital signature when sending hyperlinks (Correct) Ref: Cyber Awareness Challenge 2025 / Use of Government E-mail

Answer โœ“โœ“

Encrypt it and send it via digitally signed Government e-mail. (Correct) Ref: Cyber Awareness Challenge 2025 / Protecting PII/PHI Quiz____? You receive an e-mail with a link to run an anti-virus scan. Your IT department has not sent links like this in the past. The e-mail is not digitally signed. What action should you take? -

Answer โœ“โœ“

Report the e-mail to your security POC or help desk. (Correct) Ref: Cyber Awareness Challenge 2025 / Phishing Quiz____? Which of the following is a way to protect classified data? -

Answer โœ“โœ“

Store it in a GSA-approved container. (Correct) Ref: Cyber Awareness Challenge 2025 / Protecting Classified Data

Quiz____? How can you protect yourself from identity theft? -

Answer โœ“โœ“

Review your credit report annually. (Correct) Ref: Cyber Awareness Challenge 2025 / Identity Protection Quiz____? How can you protect your home computer? -

Answer โœ“โœ“

Use legitimate, known antivirus software (Correct) Install spyware protection software. (Correct) Ref: Cyber Awareness Challenge 2025 / Best Practices for Home Computer Security Quiz____? Which of the following poses a security risk while teleworking in an environment where Internet of Things (IoT) devices are present? -

Answer โœ“โœ“

All of these. (Correct)

Compact disc (Correct) Ref: Cyber Awareness Challenge 2025 / Removable Media, PEDs, and Mobile Devices Quiz____? Which of the following is an example of behavior that you should report? -

Answer โœ“โœ“

Bringing a phone into a prohibited area. (Correct) Ref: Cyber Awareness Challenge 2025 / Reporting Requirements Quiz____? Which of the following is NOT an appropriate use of your Common Access Card (CAC)? -

Answer โœ“โœ“

Exchanging it for a visitor pass in another building. (Correct) Ref: Cyber Awareness Challenge 2025 / CAC/PIV Card Protection Quiz____?

You receive a phone call from an unknown person asking for a directory name on your government furnished laptop so that a software update can be made. Which course of action should you take? -

Answer โœ“โœ“

Document the interaction and contact your security POC or help desk. (Correct) Ref: Cyber Awareness Challenge 2025 / Social Engineering Quiz____? Which of the following is an appropriate use of a DoD Public Key Infrastructure (PKI) token? -

Answer โœ“โœ“

Only leave it in a system while actively using it for a PKI-required task. (Correct) Ref: Cyber Awareness Challenge 2025 / DoD PKI Tokens Quiz____? How can you protect yourself on social networking sites? -

Answer โœ“โœ“

Validate connection requests through another source if possible. (Correct) Ref: Cyber Awareness Challenge 2025 / Social Networking: Protect Yourself

Answer โœ“โœ“

A personally-owned wired headset without a microphone (Correct) Ref: Cyber Awareness Challenge 2025 / Collateral Classified Spaces Quiz____? Tessa is processing payroll data that includes employees' names, home addresses, and salary. Which of the following is Tessa prohibited from doing with the data? -

Answer โœ“โœ“

Using her home computer to print the data while working remotely. (Correct) Ref: Cyber Awareness Challenge 2025 / Telework and Home Computer Security Quiz____? Which type of data could reasonably be expected to cause damage to national security? -

Answer โœ“โœ“

Confidential (Correct) Ref: Cyber Awareness Challenge 2025 / Classified Data

Quiz____? Which of the following is true of Sensitive Compartmented Information Facilities (SCIFs)? -

Answer โœ“โœ“

Personnel should physically assess whether everyone within listening distance has a need-to- know before starting conversations involving classified information. (Correct) Ref: Cyber Awareness Challenge 2025 / SCIF Situational Awareness Quiz____? When allowed, which of the following is an appropriate use of removable media? -

Answer โœ“โœ“

Labeling media that contains personally identifiable information (PII) (Correct) Ref: Cyber Awareness Challenge 2025 / Appropriate Use of Removable Media Quiz____? Which of the following is a potential Insider threat indicator? -

Answer โœ“โœ“

Death of spouse. (Correct) Ref: Cyber Awareness Challenge 2025 / personnel Detecting Insider Threats

Ref: Cyber Awareness Challenge 2025 / Removable Media, PEDs, and Mobile Devices Quiz____? Which of the following statements about Protected Health Information (PHI) is true? -

Answer โœ“โœ“

It is health information that identifies the individual. (Correct) Ref: Cyber Awareness Challenge 2025 / Protected Health Information (PHI) Quiz____? Does it pose a risk to tap your smartwatch to pay for a purchase at a store? -

Answer โœ“โœ“

Yes, there is a risk that the signal could be intercepted and altered. (Correct) Ref: Cyber Awareness Challenge 2025 / Near Field Communication (NFC) Quiz____? Which of the following is an allowed use of government furnished equipment (GFE)? -

Answer โœ“โœ“

E-mailing your supervisor (Correct) Ref: Cyber Awareness Challenge 2025 / Ethical Use of Government-Furnished Equipment (GFE) Quiz____? Based on the description provided, how many insider threat indicators are present? Edward has worked for the DoD agency for 2 years. He is an analyst who takes a great deal of interest in his work. He occasionally takes a somewhat aggressive interest in others' work as well, including asking for classified details of their projects. He otherwise gets along well with his colleagues. -

Answer โœ“โœ“

1 (Correct) Ref: Cyber Awareness Challenge 2025 / Detecting Insider Threats Quiz____? How can you protect a mobile device while traveling? -

Answer โœ“โœ“

Connect with a Government VPN. (Correct)

It can be either inadvertent or intentional. (Correct) Ref: Cyber Awareness Challenge 2025 / Spillage Quiz____? Which of the following would work in combination for two-factor authentication? -

Answer โœ“โœ“

Common Access Card (CAC) and Personal Identification Number (PIN) (Correct) Ref: Cyber Awareness Challenge 2025 / Identity Authentication Quiz____? Under which Cyberspace Protection Condition (CAPCON) is the priority focus limited to critical functions? -

Answer โœ“โœ“

CPCON 1 (Correct) Ref: Cyber Awareness Challenge 2025 / Cyberspace Protection Conditions (CPCON) Quiz____?

Which of the following is true of working within a Sensitive Compartmented Information Facility (SCIF)? -

Answer โœ“โœ“

Badges must be worn while in the facility and removed when leaving the facility. (Correct) Ref: Cyber Awareness Challenge 2025 / Sensitive Compartmented Information Facilities (SCIFs) Quiz____? When linked to a specific individual, which of the following is NOT an example of Personally Identifiable Information (PII)? -

Answer โœ“โœ“

Smartphone brand and model (Correct) Ref: Cyber Awareness Challenge 2025 / Personally Identifiable Information (PII) Quiz____? Which is an example of a strong password? -

Answer โœ“โœ“

bRobr@79I*P (Correct) Ref: Cyber Awareness Challenge 2025 / Passwords

Notify your security point of contact. (Correct) Ref: Cyber Awareness Challenge 2025 / Responding to Spillage Quiz____? Which of the following is a best practice for physical security? -

Answer โœ“โœ“

Report suspicious activity. (Correct) Ref: Cyber Awareness Challenge 2025 / Physical Security Quiz____? Who designates whether information is classified and its classification level? -

Answer โœ“โœ“

Original classification authority (Correct) Ref: Cyber Awareness Challenge 2025 / Classified Data Quiz____?

You receive a text message from a vendor notifying you that your order is on hold due to needing updated payment information from you. It provides a shortened link for you to provide the needed information. What is the best course of action? -

Answer โœ“โœ“

Delete the message (Correct) Ref: Cyber Awareness Challenge 2025 / Smishing Quiz____? Which of the following is permitted within a Sensitive Compartmented Information Facility (SCIF)? -

Answer โœ“โœ“

An authorized Government-owned Portable Electronic Device (PED) (Correct) Ref: Cyber Awareness Challenge 2025 / SCIFs and Portable Electronic Devices (PEDs) Quiz____? Which of the following is a best practice for using government e-mail? -

Answer โœ“โœ“

Do not solicit sales. (Correct)