DOD Cyber Awareness Challenge 2025
How can you protect your home computer?
A. Disable the password feature B. Authorize automatic installation of mobile code C. Disable automatic security updates D. Turn on spyware protection The correct answer is D. Turn on spyware protection.
How does an insider threat harm national security?
A. Documenting standard operating procedures for operational processes B. Underperforming their job duties C. Exploiting their trusted status and authorized access to government resources D. Threatening to quit their job unless given a promotion and salary increase The correct answer is: C. Exploiting their trusted status and authorized access to government resources.
Which of the following formats may be considered official records for Government communications?
A. E-mail B. Chat C. SMS messaging D. All of these The correct answer is: D. All of the above.
Devon receives an e-mail on her Unclassified computer. The e-mail has an unmarked attachment that contains what she recognizes as classified information. What should Devon do?
A. Forward the e-mail to her information technology POC B. Delete the e-mail C. Ask a colleague to verify that the information is classified D. Immediately notify her security POC The correct answer is: D. Immediately notify her security POC
What should you do with your badge within a Sensitive Compartmented Information Facility (SCIF)?
A. Give it to your security POC B. Wear it visibly and above the waist C. Store it in a desk drawer D. Keep it in your wallet The correct answer is: B. Wear it visibly and above the waist
Peter enters an empty conference room and finds a document with a Top Secret coversheet on it. Peter has a Secret clearance. What should Peter do?
A. Immediately notify his security POC and not handle the file B. Verify that the document contains Top Secret information C. Assume the facility has open storage and leave the document for the owner to return for it D. Destroy the document using any means available The correct answer is A. Immediately notify his security POC and not handle the file.
Which of the following is an allowed use of a government-furnished smartphone?
A. Installing a sports betting app B. Downloading games for your child to play C. Responding to e-mails on your government e-mail account D. Jailbreaking the device to customize it The correct answer is: C. Responding to e-mails on your government e-mail account
What risk is posed by Internet of Things (IoT) devices?
A. IoT devices cannot receive software or firmware updates, so they have a short functional span. B. Their unreliability can pose an inconvenience to users who grow accustomed to their functionality. C. IoT devices do not pose any security risks. D. Their connectivity can be exploited as an attack vector to any other device on the same network. The correct answer is: D. Their connectivity can be exploited as an attack vector to any other device on the same network.
What consequence could you expect from modifying government equipment without authorization?
A. Legal repercussions B. Introduction of malware to the network C. Increasing the potential for spillage D. All of these The correct answer is: D. All of these
Trisha receives an e-mail with a sensational rumor about a celebrity's personal life. Which of the following actions should Trisha NOT take with the e-mail?
A. Mark it as junk B. Delete it C. Forward it D. Ignore it The correct answer is: C. Forward it
How can you identify the separation of Sensitive Compartmented Information (SCI) classified material from collateral classified material?
A. Markings that identify the compartment with which it is affiliated B. SCI classified material and collateral classified material are indistinguishable C. The classification authority block D. The classification level of the material The correct answer is: A. Markings that identify the compartment with which it is affiliated
How should you approach a compressed URL, such as Tiny URL?
A. Never open a compressed URL B. Right-click the link to see where the link leads C. Preview where the link leads before opening it D. Open the link to see where it goes The correct answer is C. Preview where the link leads before opening it.
While picking up lunch at a cafe, Thom waits for his order at an empty table near the pickup counter. When his name is called, he gets up to retrieve his order, briefly leaving his phone sitting on the table where he was waiting. Does this pose a risk?
A. No. He was in sight of his phone, and it was a brief amount of time. B. Yes. Someone could have taken off with his phone. C. No. He can have his phone disconnected and get a new one. D. Maybe. It depends on whether his phone was locked. The correct answer is: B. Yes. Someone could have taken off with his phone.
Ed has authorized access to his agency's Sensitive Compartmented Information Facility (SCIF) and plans to work on a project there today. Which of the following can't he take into the SCIF?
A. Smartphone B. Smartwatch C. Bluetooth ear buds D. All of these The correct answer is: D. All of these
Based on the description provided, how many insider threat indicators are present? John frequently comes to work appearing to be hungover. While his access to classified information is consistent with his clearance eligibility and need-to-know, his handling of the information does not protect it from others without eligibility and a need-to-know in accordance with security guidelines. Several coworkers have observed John bringing a cell phone into classified areas where devices are prohibited.
A. 0 B. 1 C. 2 D. 3+ The correct answer is: D. 3+
What is a Security Classification Guide?
A. A primary source for derivative classification B. A person who determines whether information is classified and at what level C. A cover sheet for classified information D. A set of protocols for the physical security of classified spaces The correct answer is: A. A primary source for derivative classification
Which of the following is an example of Protected Health Information (PHI)?
A. An individual's medical record maintained by a healthcare provider B. An individual's purchase history of over-the-counter medications C. A medical diagnosis for an individual shared by that person D. The location of a first-aid kit at an office. The correct answer is A. An individual's medical record maintained by a healthcare provider.
Which of the following is an example of a correct way to protect classified data?
A. Andrea verifies need-to-know and security eligibility before sharing classified information. B. Brandon stores classified information in his locked desk drawer when he is not using the information. C. Kevin removes classified information from the secure area to work in his office with a closed door. D. Carmen avoids labeling classified information so that others' attention is not drawn to it. The correct answer is: A. Andrea verifies need-to-know and security eligibility before sharing classified information.
Which of the following is a best practice to protect your identity?
A. Carry your social security card in your wallet B. Monitor your financial statements and credit reports C. Share passwords with your family D. Use an easy-to-recall date for PINs The correct answer is: B. Monitor your financial statements and credit reports
Which of the following is an example of two-factor authentication?
A. Command Access Card (CAC) and security token B. Password and fingerprint C. Fingerprint and face identification (ID) D. Password and Personal Identification Number (PIN) The correct answer is B. Password and fingerprint.
Evelyn is a system administrator at her agency. As part of her duties, she occasionally uses a thumb drive to perform necessary system tasks, as outlined in her agency's procedures. The thumb drive is provided by the Government for this purpose. Is this an appropriate use of removable media?
A. No. Removable media are never permitted for use in the DoD. B. Maybe. Evelyn should test the Government thumb drive on a non-organizational system before connecting it to a Government system. C. Yes. Only use removable media when operationally necessary, Government-owned, and approved in accordance with policy. D. Yes, and Evelyn may also use personally owned removable media for this purpose. The correct answer is: C. Yes. Only use removable media when operationally necessary, Government-owned, and approved in accordance with policy.
Martha supervises a government unit. To improve morale, she frequently e-mails inspirational stories and photos with inspirational quotes on them to her team. Is this an appropriate use of government e-mail?
A. No. These e-mails generate unnecessary e-mail traffic. B. Yes. The e-mails don't harm anything and are sent with good intentions. C. Maybe. It depends on whether her team is offended by these e-mails. D. Maybe. It depends on the file size of the photos. The correct answer is: A. No. These e-mails generate unnecessary e-mail traffic.
Delia processes healthcare claims for Service members. As part of her duties, she sometimes needs to telephone team members and partner organizations to resolve issues specific to individual claims. As she often needs to access files and take notes on these calls, she prefers to use speakerphone so that her hands are free. She works on-site at a government facility in an open office environment. Does this pose a security concern?
A. No. While it may be annoying, it is an open office environment in a government facility, and Delia's phone calls are necessary in the performance of her work duties. B. Yes. Even in a closed work environment, Delia should take care when discussing personally identifiable information (PII) where others without a need-to-know may overhear. C. Maybe. It depends on whether the people who sit near Delia are bothered by her conversations. Otherwise, they are all government employees, so the nature of the information being discussed is not relevant. D. Maybe. It depends on whether Delia is using a government-issued device for her calls or an unauthorized personal device. The correct answer is: B. Yes. Even in a closed work environment, Delia should take care when discussing personally identifiable information (PII) where others without a need-to-know may overhear.
Oliver uses his phone to look up information about a jacket he might want to purchase. Later, he notices ads for the jacket appearing on websites that he views using his laptop. Why would he see this happen?
A. Oliver's laptop has been compromised. B. Oliver's phone has been compromised. C. The jacket must be really popular. D. Oliver's apps and devices collect and share information about him. The correct answer is: D. Oliver's apps and devices collect and share information about him.
Which of the following is a potential insider threat indicator?
A. Overt friendliness with coworkers B. Untreated alcohol use disorder C. Psychological treatment D. Reported foreign travel The correct answer is: B. Untreated alcohol use disorder
Which of the following is a best practice for working offsite during official travel?
A. Position your monitor so that it is not easily observed by others while in use B. Work in well-populated public areas to ensure your physical safety C. Download or print any classified documents you will need while away from your secure workspace D. Use personal equipment to connect to the Government Virtual Private Network (VPN) The correct answer is: A. Position your monitor so that it is not easily observed by others while in use.
Travis is processing travel reimbursements for the past quarter and needs to share travel rosters containing passport numbers with his supervisor for approval. Which is an approved way to transmit this information?
A. Printout left on the supervisor's chair in an unsecured area B. Any e-mail account with multifactor authentication enabled C. Encrypted third-party application D. Encrypted Government e-mail with a digital signature The correct answer is: D. Encrypted Government e-mail with a digital signature
Sara is a government employee with a high degree of expertise in her field. She receives an e-mail from a foreign national that is complimentary of Sara's expertise and seeks to make a connection with her to learn more about her work. What should Sara do?
A. Provide the contact with her supervisor's contact information B. Reply to the contact with unclassified documentation about her work C. Report the contact to her security POC D. Schedule a meeting with the contact to learn more The correct answer is: C. Report the contact to her security POC
You receive a text message from a commercial shipping company notifying you that they need an updated address to deliver a package to you. It provides a link for you to provide the information needed. What is the best course of action?
A. Reply to the message B. Open the link C. Delete the message D. Destroy your phone The correct answer is: C. Delete the message
How do Insider Threat Programs defend against insider threats?
A. Restricting individuals' access to government resources B. Intervening early to help individuals with issues C. Imprisoning anyone who exhibits a threat indicator D. Terminating the employment of any individual who exhibits a threat indicator The correct answer is B. Intervening early to help individuals with issues
Which of the following is true of transmitting Sensitive Compartmented Information (SCI)?
A. SCI may be faxed using any facsimile machine. B. SCI may be printed using an authorized printer when retrieved promptly. C. SCI may only be transmitted electronically. D. SCI must never be escorted, hand-carried, or couriered. The correct answer is: B. SCI may be printed using an authorized printer when retrieved promptly.
Which of the following is a best practice when browsing the Internet?
A. Set your browser to automatically accept all cookies B. Confirm that the site uses an unencrypted link C. Look for h-t-t-p in the URL name D. Look for an icon to indicate encryption is functioning The correct answer is: D. Look for an icon to indicate encryption is functioning.
What is a risk to Government systems posed by removable media?
A. Their portable nature and generally small size make them vulnerable to physical damage, so they are unreliable. B. Their data storage and ability to connect to systems can lead to unintended transfers of information, such as introduction of malicious code or spillage. C. Data stored on these devices cannot be overwritten, so they are limited to one-time use. D. Their high price tag means that they are limited in availability, so they must be used selectively. The correct answer is: B. Their data storage and ability to connect to systems can lead to unintended transfers of information, such as introduction of malicious code or spillage.
How can you protect your home computer? (2nd question)
A. Use the default operating system account B. Disable file backups C. Turn off the firewall D. Scan files for viruses The correct answer is: D. Scan files for viruses.
Which of the following e-mail practices can help to prevent inadvertently downloading viruses?
A. View e-mails in rich text instead of plain text B. Use the Preview Pane instead of opening e-mails C. Look for a digital signature on e-mails D. Forward e-mails you suspect to be infected to your information technology POC The correct answer is: C. Look for a digital signature on e-mails
You receive a suspicious e-mail that appears to have come from an organization that partners with your agency. Your co-workers have received a similar e-mail. What might this be?
A. Vishing B. Whaling C. Smishing D. Spear phishing The correct answer is: D. Spear phishing.
Which of the following personally owned peripherals can you use with government furnished equipment (GFE)?
A. Wired keyboards, mice, and trackballs through a USB connection B. Headphones and headsets without microphones through a Bluetooth connection C. All peripherals, regardless of ownership, are authorized for use. D. Only government furnished peripherals are authorized for use. The correct answer is: D. Only government furnished peripherals are authorized for use.
Oscar is on official Government travel with a Government-issued laptop. While at the airport, he uses the laptop to work on a report containing controlled unclassified information (CUI). For connectivity, he uses his personal phone as a mobile hotspot. Are there any security concerns here?
A. Yes. He should be vigilant for "shoulder surfing," where others may be able to view the information on his screen. B. No. The only risk presented in public environments is the potential use of public Wi-Fi. C. Yes. He should not have brought his Government laptop on the trip. D. Yes. The laptop is physically vulnerable, so he should use his personal device to work on the report. The correct answer is: A. Yes. He should be vigilant for "shoulder surfing," where others may be able to view the information on his screen.
While taking a break at your workstation, you switch to your computer's web browser intending to look up the evening's weather forecast. You notice open tabs in your web browser that you don't recall opening. Is this a concern?
A. Yes. You should close your web browser when you are not actively using it. B. No. The browser probably just updated. C. Yes. The appearance of new extensions or tabs in your web browser may indicate a cybersecurity incident. D. Maybe. It depends on whether someone else may have been using your workstation without your knowledge. The correct answer is: C. Yes. The appearance of new extensions or tabs in your web browser may indicate a cybersecurity incident.
How can you take back any content you post to a social networking site if you change your mind?
A. You can't. Once you post it, the site owns your content. B. Delete the post. C. Send a request to the site owner to purge your profile data. D. Disable your site account. The correct answer is: A. You can't. Once you post it, the site owns your content.
