DOD Cyber Awareness Challenge 2025
which of the following is true of spillage
It can be either inadvertent or intentional
which of the following is true of scifs
Personnel should physically assess whether everyone within listening distance has a need to know before starting convos involving classified info
when is the safest time to post on social media about your work related travel
after the trip
how can malicious code do damage
all of these
which of the following can be used to catalogue information about you
all of these
which of these is not a potential indicator that your device may be under a malicious code attack
an OS update
which of the following is true of compressed urls
can be used to mask malicious intent
which of the following is an example of removable media
compact disc
best practice for telework and remote work
connect to your government vpn
what is a best practices for creating user accounts for your home computer
create separate accounts and each user makes their own password
as you scroll through your social media feed, a news headline catches your eye. what should you consider before sharing it with your connections
credibility
Which of the following is a potential insider threat indicator
death of a spouse
you receive a text message from a vendor notifying you that your order is on hold due to needing updated payment information from you. it provides a shortened link for you to provide the needed information. what is the best course of action?
delete the message
which of the following is an allowed GFE
emailing your supervisor
how can you protect a mobile device while traveling
gov. vpn
which of the following is true of CUI
it belongs to a defined category established in the DoD CUI registry.
which of the following describes SCI
provides an overlay of security
which of the following uses of removable media is allowed
sam uses approved gov. owned removeable media to transfer files between gov. systems as authorized
how can you prevent viruses and malicious code
scan all e-mail attachments
you receive an email marked important from your agency head asking you to call them using a n umber you do not recognize. the email was sent from a personal email address that you do not recognize, but it addresses you by name. what action should you take
spear phishing attempt. report it
which of the following is an appropriate use of a DoD PKI token
use it on a system for pki required task
how can you protect yourself from social networking sites
validate the connection requests through another source
steve occasionally runs errands during virtual meetings. he joins the meetings using his approved gov. device. does this pose a security concern?
yes, the easy droppers could be listening