DOD Cyber Awareness Challenge 2025 Knowledge check

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of these is NOT a potential indicator that your device may be under a malicious code attack?

An operating system update

Which of the following is a way to protect classified data?

Store it in a GSA-approved container

Which of the following is an example of removable media?

Compact disc

Which of the following is NOT an appropriate use of your Common Access Card (CAC)?

Exchanging it for a visitor pass in another building.

How can you protect yourself from identity theft?

Review your credit report annually

How can you protect your home computer?

Install spyware protection software

What are the requirements for access to Sensitive Compartmented Information (SCI)?

Top Secret clearance and indoctrination into the SCI program

Which of the following is permitted when using an unclassified laptop within a collateral classified space?

A personally-owned wired headset without a microphone

Which of the following poses a security risk while teleworking in an environment where Internet of Things (IoT) devices are present?

All of these.

Which of the following is a best practice to protect your identity?

Ask how information will be used before giving it out.

Which of the following is an example of behavior that you should report?

Bringing a phone into a prohibited area

What is a best practice for creating user accounts for your home computer?

Create separate accounts for each user and have each user create their own password.

You receive a phone call from an unknown person asking for a directory name on your government furnished laptop so that a software update can be made. Which course of action should you take?

Document the interaction and contact your security POC or help desk

Matt is a government employee who needs to share a document containing source selection data with his supervisor. Which of the following describes the most appropriate way for Matt to do this?

Encrypt it and send it via digitally signed Government e-mail

John receives an e-mail about a potential shutdown of a major social service unless a petition receives enough signatures. Which of the following actions should John NOT take with the e-mail?

Forward it

Which of the following is an appropriate use of a DoD Public Key Infrastructure (PKI) token?

Only leave it in a system while actively using it for a PKI-required task

You receive an e-mail with a link to run an anti-virus scan. Your IT department has not sent links like this in the past. The e-mail is not digitally signed. What action should you take?

Report the e-mail to your security POC or help desk.

How can you prevent viruses and malicious code?

Scan all e-mail attachments

Which of the following is true of compressed URLs (e.g., TinyURL, goo.gl)?

They may be used to mask malicious intent

You receive an e-mail marked important from your agency head asking you to call them using a number you do not recognize. The e-mail was sent from a personal e-mail address that you do not recognize, but it addresses you by name. What action should you take?

This may be a spear phishing attempt. Report it to your security POC or help desk.

How can you protect your home computer?

Use legitimate, known antivirus software

How can you protect data on a mobile device?

Use two-factor authentication

Which of the following is an appropriate use of government e-mail?

Using a digital signature when sending hyperlinks

How can you protect yourself on social networking sites?

Validate connection requests through another source if possible

Steve occasionally runs errands during virtual meetings. He joins the meetings using his approved government device. Does this pose a security concern?

Yes. Eavesdroppers may be listening to Steve's conversation


Kaugnay na mga set ng pag-aaral

PrepU - Ch.25 Assessment of Cardiovascular Function

View Set

CS271 - WEEK 8 - Summary Excersizes

View Set

Chapter 11 Additional Test Questions

View Set

Netflix Will Have To Be More Careful Raising Prices

View Set