DOD Cyber Awareness Challenge 2025 Knowledge Check-1 Part 1
This flashcard deck covers key concepts from the DOD Cyber Awareness Challenge 2025, including best practices for online security, identity protection, and appropriate use of government resources.
Which of the following is true of compressed URLs (e.g., TinyURL, goo.gl)?
They may be used to mask malicious intent. (Correct)
Ref: Cyber Awareness Challenge 2025 / Compressed URLs
Key Terms
Which of the following is true of compressed URLs (e.g., TinyURL, goo.gl)?
They may be used to mask malicious intent. (Correct)
Ref: Cyber Awareness Challenge 2025 / Compressed URLs
What is a best practice for creating user accounts for your home computer?
Create separate accounts for each user and have each user create their own password. (Correct)
Ref: Cyber Awareness Challenge 2025 / Best Pr...
Which of the following is a best practice to protect your identity?
Ask how information will be used before giving it out. (Correct)
Ref: Cyber Awareness Challenge 2025 / Identity Protection
John receives an e-mail about a potential shutdown of a major social service unless a petition receives enough signatures. Which of the following actions should John NOT take with the e-mail?
Forward it (Correct)
Ref: Cyber Awareness Challenge 2025 / Phishing
Which of the following is an appropriate use of government e-mail?
Using a digital signature when sending hyperlinks (Correct)
Ref: Cyber Awareness Challenge 2025 / Use of Government E-mail
Steve occasionally runs errands during virtual meetings. He joins the meetings using his approved government device. Does this pose a security concern?
Yes. Eavesdroppers may be listening to Steve's conversation (Correct)
Ref: Common Sense
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
Which of the following is true of compressed URLs (e.g., TinyURL, goo.gl)? | They may be used to mask malicious intent. (Correct) |
What is a best practice for creating user accounts for your home computer? | Create separate accounts for each user and have each user create their own password. (Correct) |
Which of the following is a best practice to protect your identity? | Ask how information will be used before giving it out. (Correct) |
John receives an e-mail about a potential shutdown of a major social service unless a petition receives enough signatures. Which of the following actions should John NOT take with the e-mail? | Forward it (Correct) |
Which of the following is an appropriate use of government e-mail? | Using a digital signature when sending hyperlinks (Correct) |
Steve occasionally runs errands during virtual meetings. He joins the meetings using his approved government device. Does this pose a security concern? | Yes. Eavesdroppers may be listening to Steve's conversation (Correct) |
How can you prevent viruses and malicious code? | Scan all e-mail attachments (Correct) |
Matt is a government employee who needs to share a document containing source selection data with his supervisor. Which of the following describes the most appropriate way for Matt to do this? | Encrypt it and send it via digitally signed Government e-mail. (Correct) |
You receive an e-mail with a link to run an anti-virus scan. Your IT department has not sent links like this in the past. The e-mail is not digitally signed. What action should you take? | Report the e-mail to your security POC or help desk. (Correct) |
Which of the following is a way to protect classified data? | Store it in a GSA-approved container. (Correct) |
How can you protect yourself from identity theft? | Review your credit report annually. (Correct) |
How can you protect your home computer? | Use legitimate, known antivirus software (Correct) |
Which of the following poses a security risk while teleworking in an environment where Internet of Things (IoT) devices are present? | All of these. (Correct) |
Which of these is NOT a potential indicator that your device may be under a malicious code attack? | An operating system update (Correct) |
What are the requirements for access to Sensitive Compartmented Information (SCI)? | Top Secret clearance and indoctrination into the SCI program. (Correct) |
Which of the following is an example of removable media? | Compact disc (Correct) |
Which of the following is an example of behavior that you should report? | Bringing a phone into a prohibited area. (Correct) |
Which of the following is NOT an appropriate use of your Common Access Card (CAC)? | Exchanging it for a visitor pass in another building. (Correct) |
You receive a phone call from an unknown person asking for a directory name on your government furnished laptop so that a software update can be made. Which course of action should you take? | Document the interaction and contact your security POC or help desk. (Correct) |
Which of the following is an appropriate use of a DoD Public Key Infrastructure (PKI) token? | Only leave it in a system while actively using it for a PKI-required task. (Correct) |