Back to AI Flashcard MakerInformation Technology /DOD Cyber Awareness Challenge 2025 Knowledge Check-1 Part 1

DOD Cyber Awareness Challenge 2025 Knowledge Check-1 Part 1

Information Technology20 CardsCreated 5 months ago

This flashcard deck covers key concepts from the DOD Cyber Awareness Challenge 2025, including best practices for online security, identity protection, and appropriate use of government resources.

Which of the following is true of compressed URLs (e.g., TinyURL, goo.gl)?

They may be used to mask malicious intent. (Correct)

Ref: Cyber Awareness Challenge 2025 / Compressed URLs

Tap or swipe ↕ to flip
Swipe ←→Navigate
1/20

Key Terms

Term
Definition

Which of the following is true of compressed URLs (e.g., TinyURL, goo.gl)?

They may be used to mask malicious intent. (Correct)

Ref: Cyber Awareness Challenge 2025 / Compressed URLs

What is a best practice for creating user accounts for your home computer?

Create separate accounts for each user and have each user create their own password. (Correct)

Ref: Cyber Awareness Challenge 2025 / Best Pr...

Which of the following is a best practice to protect your identity?

Ask how information will be used before giving it out. (Correct)

Ref: Cyber Awareness Challenge 2025 / Identity Protection

John receives an e-mail about a potential shutdown of a major social service unless a petition receives enough signatures. Which of the following actions should John NOT take with the e-mail?

Forward it (Correct)

Ref: Cyber Awareness Challenge 2025 / Phishing

Which of the following is an appropriate use of government e-mail?

Using a digital signature when sending hyperlinks (Correct)

Ref: Cyber Awareness Challenge 2025 / Use of Government E-mail

Steve occasionally runs errands during virtual meetings. He joins the meetings using his approved government device. Does this pose a security concern?

Yes. Eavesdroppers may be listening to Steve's conversation (Correct)

Ref: Common Sense

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition

Which of the following is true of compressed URLs (e.g., TinyURL, goo.gl)?

They may be used to mask malicious intent. (Correct)

Ref: Cyber Awareness Challenge 2025 / Compressed URLs

What is a best practice for creating user accounts for your home computer?

Create separate accounts for each user and have each user create their own password. (Correct)

Ref: Cyber Awareness Challenge 2025 / Best Practices for Home Computer Security

Which of the following is a best practice to protect your identity?

Ask how information will be used before giving it out. (Correct)

Ref: Cyber Awareness Challenge 2025 / Identity Protection

John receives an e-mail about a potential shutdown of a major social service unless a petition receives enough signatures. Which of the following actions should John NOT take with the e-mail?

Forward it (Correct)

Ref: Cyber Awareness Challenge 2025 / Phishing

Which of the following is an appropriate use of government e-mail?

Using a digital signature when sending hyperlinks (Correct)

Ref: Cyber Awareness Challenge 2025 / Use of Government E-mail

Steve occasionally runs errands during virtual meetings. He joins the meetings using his approved government device. Does this pose a security concern?

Yes. Eavesdroppers may be listening to Steve's conversation (Correct)

Ref: Common Sense

How can you prevent viruses and malicious code?

Scan all e-mail attachments (Correct)

Ref: Cyber Awareness Challenge 2025 / Protecting Against Malicious Code

Matt is a government employee who needs to share a document containing source selection data with his supervisor. Which of the following describes the most appropriate way for Matt to do this?

Encrypt it and send it via digitally signed Government e-mail. (Correct)

Ref: Cyber Awareness Challenge 2025 / Protecting PII/PHI

You receive an e-mail with a link to run an anti-virus scan. Your IT department has not sent links like this in the past. The e-mail is not digitally signed. What action should you take?

Report the e-mail to your security POC or help desk. (Correct)

Ref: Cyber Awareness Challenge 2025 / Phishing

Which of the following is a way to protect classified data?

Store it in a GSA-approved container. (Correct)

Ref: Cyber Awareness Challenge 2025 / Protecting Classified Data

How can you protect yourself from identity theft?

Review your credit report annually. (Correct)

Ref: Cyber Awareness Challenge 2025 / Identity Protection

How can you protect your home computer?

Use legitimate, known antivirus software (Correct)
Install spyware protection software. (Correct)

Ref: Cyber Awareness Challenge 2025 / Best Practices for Home Computer Security

Which of the following poses a security risk while teleworking in an environment where Internet of Things (IoT) devices are present?

All of these. (Correct)

Ref: Cyber Awareness Challenge 2025 / Internet of Things (IoT)

Which of these is NOT a potential indicator that your device may be under a malicious code attack?

An operating system update (Correct)

Ref: Cyber Awareness Challenge 2025 / Incident Indicators

What are the requirements for access to Sensitive Compartmented Information (SCI)?

Top Secret clearance and indoctrination into the SCI program. (Correct)

Ref: Cyber Awareness Challenge 2025 / Sensitive Compartmented Information (SCI)

Which of the following is an example of removable media?

Compact disc (Correct)

Ref: Cyber Awareness Challenge 2025 / Removable Media, PEDs, and Mobile Devices

Which of the following is an example of behavior that you should report?

Bringing a phone into a prohibited area. (Correct)

Ref: Cyber Awareness Challenge 2025 / Reporting Requirements

Which of the following is NOT an appropriate use of your Common Access Card (CAC)?

Exchanging it for a visitor pass in another building. (Correct)

Ref: Cyber Awareness Challenge 2025 / CAC/PIV Card Protection

You receive a phone call from an unknown person asking for a directory name on your government furnished laptop so that a software update can be made. Which course of action should you take?

Document the interaction and contact your security POC or help desk. (Correct)

Ref: Cyber Awareness Challenge 2025 / Social Engineering

Which of the following is an appropriate use of a DoD Public Key Infrastructure (PKI) token?

Only leave it in a system while actively using it for a PKI-required task. (Correct)

Ref: Cyber Awareness Challenge 2025 / DoD PKI Tokens