Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

US Navy Cyber Awareness Challenge 2025/2026 Proven Practice Questions & Expert Solutions, Exams of Cybercrime, Cybersecurity and Data Privacy

US Navy Cyber Awareness Challenge 2025/2026 Proven Practice Questions & Expert Solutions

Typology: Exams

2024/2025

Available from 04/16/2025

Shantelle
Shantelle 🇺🇸

5

(2)

3K documents

1 / 57

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
US Navy Cyber Awareness Challenge
2025/2026
When allowed, which of the following is an appropriate use of removable
media?
-Labeling media that contains personally identifiable information (PII)
-Destroying removable media with a refrigerator magnet
-Downloading data from classified networks
-Discarding unneeded removable media in the trash - Correct Answer ✔️✔
Labeling media that contains personally identifiable information (PII)
How can you prevent viruses and malicious code?
-Email infected files to your security POC
-View e-mail using the Preview Pane rather than opening it
Allow mobile code to run on all websites
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e
pf1f
pf20
pf21
pf22
pf23
pf24
pf25
pf26
pf27
pf28
pf29
pf2a
pf2b
pf2c
pf2d
pf2e
pf2f
pf30
pf31
pf32
pf33
pf34
pf35
pf36
pf37
pf38
pf39

Partial preview of the text

Download US Navy Cyber Awareness Challenge 2025/2026 Proven Practice Questions & Expert Solutions and more Exams Cybercrime, Cybersecurity and Data Privacy in PDF only on Docsity!

US Navy Cyber Awareness Challenge

When allowed, which of the following is an appropriate use of removable media?

-Labeling media that contains personally identifiable information (PII) -Destroying removable media with a refrigerator magnet -Downloading data from classified networks -Discarding unneeded removable media in the trash - Correct Answer ✔️ ✔ ️ Labeling media that contains personally identifiable information (PII) How can you prevent viruses and malicious code?

-Email infected files to your security POC -View e-mail using the Preview Pane rather than opening it Allow mobile code to run on all websites

-Scan all e-mail attachments - Correct Answer ✔️ ✔️ Scan all e-mail attachments You receive a phone call from an unknown person asking for a directory name on your government furnished laptop so that a software can be made. Which course of action should you take?

-Document the interaction and contact your security POC or help desk -Provide the information but decline to update the software -Provide the information and follow instructions -End the call with no further action - Correct Answer ✔ ️ ✔️ Document the interaction and contact your security POC or help desk Which of the following is a best practice for protecting your home wireless network for telework or remote work?

-Implement, as a minimum, Wi-Fi Protected Access 2 (WPA2) Personal encryption

-Open the link to provide information -Reply to the message and ask for more information -Delete the message -Open the link to inspect the website - Correct Answer ✔ ️ ✔️ Delete the message Which of these is NOT a potential indicator that your device may be under a malicious code attack?

-The device slows down -Loss of control of the mouse or keyboard -A strange pop-up during system startup -An operating system update - Correct Answer ✔️ ✔ ️ An operating system update What is a best practice for creating user accounts for your home computer?

-Do not share your home computer with any other user -Create separate accounts for each user and tailor each password wo what will be easy for the individual user to remember -Set up a generic user account with no password for general user functions -Create separate accounts for each user and have each user create their own password - Correct Answer ✔️ ✔️ Create separate accounts for each user and have each user create their own password Which of the following is permitted when using an unclassified laptop within a collateral classified space?

-A Government-issued wireless headset with a microphone -A microphone embedded in the laptop -A personally-owned wired headset without a microphone -A Government-issued wireless headset without microphone - Correct Answer ✔️ ✔️ A personally-owned wired headset without a microphone

-Their utility outweighs any risk associated with them. - Correct Answer ✔️ ✔️ The risk associated with them may lead to loss of life.

Which of the following provides precise, comprehensive guidance regarding specific program, system, operation, or weapon system elements of information to be classified?

-Classification Management Tool -Local Security Official -Security Classification Guide -Classification Registry - Correct Answer ✔ ️ ✔️ Security Classification Guide

How can you protect data on a mobile device?

-Use two-factor authentication -Store your data on a commercial cloud application -Disable automatic screen locking after a period of inactivity

-Turn over your device as requested by authority figures - Correct Answer ✔ ️ ✔️ Use two-factor authentication

Which of the following is true of compressed URLs (e.g., Tiny URL, goo.gl)?

-You must open the link to find out where it leads. -You can hover your cursor over it to preview where it actually leads. -They pose no risk. -They may be used to mask malicious intent - Correct Answer ✔️ ✔️ They may be used to mask malicious intent Which type of data could reasonably be expected to cause damage to national security?

-Secret -Confidential -Controlled Unclassified Information (CUI)

How can you protect a mobile device while traveling?

-Only use public Wi-Fi offered by established businesses -Only make voice calls, as they are more secure than data transmissions -Connect with a Government VPN -Store the device in a hotel safe when sightseeing - Correct Answer ✔️ ✔ ️ Connect with a Government VPN

How can you protect your home computer?

-Turn off antivirus software scans -Install spyware protection software -Disable firewall protection -Accept all mobile code - Correct Answer ✔️ ✔️ Install spyware protection software How can you protect your home computer?

-Use the administration account for all users -Disable the password feature -Decline security updates -Use legitimate, known antivirus software - Correct Answer ✔ ️ ✔ ️ Use legitimate, known antivirus software Which of the following is true of spillage?

-It occurs when authorization to transfer information is granted and then later revoked. -It describes information that is "spilled" to either a lower or higher protection level. -It refers specifically to classified information that becomes publicly available. -It can be either inadvertent or intentional. - Correct Answer ✔️ ✔️ It can be either inadvertent or intentional.

Which of the following is a way to protect classified data?

-Remove classification markings when transporting it -Store it in a GSA-approved container -Use a classified network for unclassified work -Destroy inappropriately marked material - Correct Answer ✔ ️ ✔️ Store it in a GSA-approved container What are the requirements for access to Sensitive Compartmented Information (SCI)?

-The access caveats specified by the Direct of National Intelligence -The appropriate level of security clearance eligibility and a need-to-know -Top Secret clearance and indoctrination into the SCI program -Secret clearance and a signed nondisclosure agreement (NDA) - Correct Answer ✔️ ✔️ Top Secret clearance and indoctrination into the SCI program

Which of the following poses a security risk while teleworking in an environment where Internet of Things (IoT) devices are present?

-Voice-enabled listening recording -Default IoT device passwords -Unknown devices connected via Bluetooth -All of these - Correct Answer ✔️ ✔️ All of these

Which of the following is an example of behavior that you should report?

-Planning an overseas vacation -Drinking alcohol socially -Expressing dislike of a recent Presidential action -Bringing a phone into a prohibited area - Correct Answer ✔️ ✔ ️ Bringing a phone into a prohibited area

Which of the following can be used to catalogue information about you?

-Social networking sites -Audio-enabled digital assistants (e.g., Siri, Alexa) -Fitness trackers -All of these - Correct Answer ✔️ ✔️ All of these

Which of the following is a best practice to protect your identity?

-Throw credit card and bank statement in the trash -Carry your passport with you at all times -Enable data aggregation on sites when possible -Ask how information will be used before giving it out - Correct Answer ✔️ ✔️ Ask how information will be used before giving it out Which of the following describes Sensitive Compartmented Information (SCI)?

-The requirement for access to SCI material are security clearance eligibility and need-to-know -SCI introduces an overlay of security to Top Secret, Secret, and Confidential information. -The determination that a piece of information is SCI is made at the organizational level. -SCI is a type of Controlled Unclassified Information (CUI). - Correct Answer ✔ ️ ✔️ SCI introduces an overlay of security to Top Secret, Secret, and Confidential information. Which of the following is the safest to share on a social media networking site?

-Your birthdate -Your mother's maiden name -Your favorite movie -Your current location - Correct Answer ✔️ ✔ ️ Your favorite movie

Which of the following is an example of removable media?

-You must be courier-briefed for SCI to transport it. -SCI does not require a coversheet in an open storage environment. -You may only transmit SCI via certified mail. -You must never print SCI. - Correct Answer ✔️ ✔️ You must be courier- briefed for SCI to transport it. Adam sees a coworker who does not have the required clearance with a printed document marked as Sensitive Compartmented Information (SCI). What should he do?

-Contact his security POC to report the incident. -E-mail his security POC with detailed information about the information and person involved. -Nothing. It is not his responsibility. -Retrieve the document and verify that the coworker did not read it. - Correct Answer ✔️ ✔️ Contact his security POC to report the incident.

Which of the following is true for Controlled Unclassified Information (CUI)?

-It is another term for any Unclassified information that has not been cleared for public release. -It is marked as CUI at the discretion of the information owner. -It poses no risk to Government missions or interests. -It belongs to a defined category established in the DoD CUI Registry. - Correct Answer ✔️ ✔️ It belongs to a defined category established in the DoD CUI Registry. You received an e-mail marked important from your agency head asking you to call them using a number you do not recognize. The e-mail was sent from a personal e-mail address that you do not recognize, but it addresses you by name. What action should you take?

-This may be a spear phishing attempt. Report it to your security POC or help desk.