


Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
DOD Cyber Awareness Challenge 2025 Knowledge Check. Questions and Correct Verified Answers. Graded A
Typology: Exams
1 / 4
This page cannot be seen from the preview
Don't miss anything!
How can you prevent viruses and malicious code? - ANSScan all e-mail attachments How can you protect data on a mobile device? - ANSUse two-factor authentication How can you protect your home computer? - ANSInstall spyware protection software How can you protect your home computer? - ANSUse legitimate, known antivirus software How can you protect yourself from identity theft? - ANSReview your credit report annually How can you protect yourself on social networking sites? - ANSValidate connection requests through another source if possible John receives an e-mail about a potential shutdown of a major social service unless a petition receives enough signatures. Which of the following actions should John NOT take with the e-mail? - ANSForward it
Matt is a government employee who needs to share a document containing source selection data with his supervisor. Which of the following describes the most appropriate way for Matt to do this? - ANSEncrypt it and send it via digitally signed Government e-mail Steve occasionally runs errands during virtual meetings. He joins the meetings using his approved government device. Does this pose a security concern? - ANSYes. Eavesdroppers may be listening to Steve's conversation What are the requirements for access to Sensitive Compartmented Information (SCI)? - ANSTop Secret clearance and indoctrination into the SCI program What is a best practice for creating user accounts for your home computer? - ANSCreate separate accounts for each user and have each user create their own password. Which of the following is a best practice to protect your identity? - ANSAsk how information will be used before giving it out. Which of the following is a way to protect classified data? - ANSStore it in a GSA- approved container Which of the following is an appropriate use of a DoD Public Key Infrastructure (PKI) token? - ANSOnly leave it in a system while actively using it for a PKI-required task Which of the following is an appropriate use of government e-mail? - ANSUsing a digital signature when sending hyperlinks
You receive an e-mail marked important from your agency head asking you to call them using a number you do not recognize. The e-mail was sent from a personal e-mail address that you do not recognize, but it addresses you by name. What action should you take? - ANSThis may be a spear phishing attempt. Report it to your security POC or help desk. You receive an e-mail with a link to run an anti-virus scan. Your IT department has not sent links like this in the past. The e-mail is not digitally signed. What action should you take? - ANSReport the e-mail to your security POC or help desk.