cyber awareness Army 2025
Which of these is NOT a potential indicator that your device may be under a maliciouy code attack? Loss of control of the mouse or keyboard Astrange PoP-UP during system startup The device slows down An operating system update
An operating system update
How can you prevent viruses and malicious code? ○View e-mail using the Preview Pane rather than opening it ○ Scan all e-mail attachments ○ Allow mobile code to run on all websites ○ E-mail infected files to your security POC
Scan all e-mail attachments
How can you protect data on a mobile device? ○ Store your data on a com mercial doud application ○ Use two-factor authentication Disable automatic screen locking after a period of inactivity Turn over your device a5 requested by Buthority figures
Use two-factor authentication
Which of the following is permitted when using an unclassified laptop within a collateral classified space? A Government-issued wireless headset with a microphone ○ Amicrophone embedded in the A Government-issued wireless headset without microphone A personally-owned wired headset without microphone
A personally-owned wired headset without microphone
Employee Passport Number Adams, Jeff A12345678 Brown, Marty B23456789 Clark, Tina C34567890 When e-mailing this personnel roster, which of the following should you do? Encrypt the PlI Digitally sign the e-mail Use your Government e-mail account
ALL
When is the safest time to post on social media about your work-related travel? After the trip ○ During the trijp Before the trip
After the trip.
Which of the following is an allowed use of government furnished equipment (GFE)? ○ Conducting ransactions on your side business E-mailing your supervisor Viewing family photos from your shared DropBox Lending it to your spouse to watch a movie
E-mailing your supervisor
Which of the following is true of transmitting or transporting Sensitive Compartmented Information (SCI)? You must be courier-briefed for 5CI to transport it. ○ SC does not require a covers heet in an open storage environment. You may only transmit SCI via certified mail. You must never print SCl
You must be courier-briefed for SCI to transport it
Which of the following can be used to catalogue information about you? Social networking sites ○ Audio-enabled digital assistants (e.g., Siri, Alexa) ○ Fitness trackers ○ All of these
All of these
Which of the following poses a security risk while teleworking in an environment where Internet of Things (loT) devices are present? Voice. enabled listening and recording S Default loT device passwords Unknown devices connected via Bluetooth All of these
All of these
Which of the following is a best practice for protecting your home wireless network for telework or remote work? ○ Turn off al other devices that connect to your router while working ○ Use your router's pre-set Service Set identifier (SSID) and password Implement, a5 a minimum, Wi-Fi Protected Access 2 (WPA2) Personal encryption Open access to your network to all devices
Implement, as a minimum, Wi-Fi Protected Access 2 (WPA2) Personal encryption.
As you browse a social media site, you come across photos of information with classification markings. What should you do? ○ Notify your security point of contact ○ Download the information to your computer. ○ You may forward the URL to the information to interested parties. ○ You are authorized to respond to inquiries about it.
Notify your security point of contact
Which of the following is true of Sensitiye Compartmented Information Facilities (SCIFs)? Phone conversations within a SCIF are inherently secure and require no further protection. 6 D Personnel should physically assess whether everyone within listening distance has need-to-know before starting conversations involving classified information. SCIFS are not Permitted to be constructed with windows unless fixred unalterable window coverings are in place. ○ Due to the physical security measures in place within a SCIF, open storage is allowed.
Personnel should physically assess whether everyone within listening distance has need-to-know before starting conversations involving classified information
Which of the following uses of removable media is allowed? ○ Nickgy uses Undlassified government owned removable media to transfer work files to a personal laptop. ○ Sam uses approved Government owned removable media to transfer files between government systems as authorized. ○ Cameron connects a personal phone to an Unclassified government laptop to charge. ○Alex uses personally owned removable media on an Unclassified government laptop to transfer personal music files
Sam uses approved Government owned removable media to transfer files between government systems as authorized.
Which of the following is true of removable media and portable electronic devices (PEDs)? The risks associated with them may lead to loss of life. Removable media pose more risks than PEDs and are not permitted in government facilities. Their utility Outweighs any risk associated with them. D They cannot be adequately secured, So they are prohibited by the DoD.
The risks associated with them may lead to loss of life
Your meeting notes are Unclassified. This means that your notes: May be released to the public. Do not have the potential to damage national security. Do not have the potential to affect the safety of personnel, missions, or systems, Do not require any markings. Help Me
do not have the potential to damage national security
Which of the following is permitted within a Sensitive Compartmented Information Facility (SCIF)? A Govemment-issued smartphone D An authorized Government-owned Portable Electronic Device (PED) # A Government-issued laptop with Wi-fi capability fe A Bluetooth medical device, such as glucose monitor
An authorized Government-owned Portable Electronic Device (PED).
Which of the following is NOT an appropriate use of. your Common Access Card Reporting it immediately if lost or misplaced E D C e Exchanging it for visitor pass in another building m Using On Systems with up-to- date security E Storing it in a: shielded sleeve
Exchanging it for a visitor pass in another building
Which of the following is a best practice when browsing the Internet? ○ Set your browser to Bccept all cookies E Confirm that the site uses an unencrypted link Save your cedit crd information or. e-commerce sites ○ Look forh-ttp-s in the URL name
Look for https in the URL name