Back to AI Flashcard MakerInformation Technology /DOD Cyber Awareness Challenge 2025 Knowledge Check Part 2

DOD Cyber Awareness Challenge 2025 Knowledge Check Part 2

Information Technology25 CardsCreated 5 months ago

This deck covers key concepts from the DOD Cyber Awareness Challenge 2025, focusing on cybersecurity best practices, insider threats, and handling sensitive information.

Tessa is processing payroll data that includes employees' names, home addresses, and salary. Which of the following is Tessa prohibited from doing with the data?

Using her home computer to print the data while working remotely. (Correct) Ref: Cyber Awareness Challenge 2025 / Telework and Home Computer Security
Tap or swipe ↕ to flip
Swipe ←→Navigate
1/25

Key Terms

Term
Definition
Tessa is processing payroll data that includes employees' names, home addresses, and salary. Which of the following is Tessa prohibited from doing with the data?
Using her home computer to print the data while working remotely. (Correct) Ref: Cyber Awareness Challenge 2025 / Telework and Home Computer Security
Which type of data could reasonably be expected to cause damage to national security?
Secret
Which of the following is true of Sensitive Compartmented Information Facilities (SCIFs)?
SCIFs are not permitted to be constructed with windows unless fixed, unalterable window coverings are in place.
When allowed, which of the following is an appropriate use of removable media?
Labeling media that contains personally identifiable information (PII) (Correct) Ref: Cyber Awareness Challenge 2025 / Appropriate Use of Removable Me...
Which of the following is a potential Insider threat indicator?
Financial windfall from an inheritance
Which of the following is a best practice when browsing the Internet?
Look for h-t-t-p-s in the URL name

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition
Tessa is processing payroll data that includes employees' names, home addresses, and salary. Which of the following is Tessa prohibited from doing with the data?
Using her home computer to print the data while working remotely. (Correct) Ref: Cyber Awareness Challenge 2025 / Telework and Home Computer Security
Which type of data could reasonably be expected to cause damage to national security?
Secret
Which of the following is true of Sensitive Compartmented Information Facilities (SCIFs)?
SCIFs are not permitted to be constructed with windows unless fixed, unalterable window coverings are in place.
When allowed, which of the following is an appropriate use of removable media?
Labeling media that contains personally identifiable information (PII) (Correct) Ref: Cyber Awareness Challenge 2025 / Appropriate Use of Removable Media
Which of the following is a potential Insider threat indicator?
Financial windfall from an inheritance
Which of the following is a best practice when browsing the Internet?
Look for h-t-t-p-s in the URL name
Which of the following would work in combination for two-factor authentication?
Common Access Card (CAC) and Personal Identification Number (PIN)
Which of the following is a best practice for protecting your home wireless network for telework or remote work?
Implement, as a minimum, Wi-Fi Protected Access 2 (WPA2) Personal encryption.
Which of the following is true of removable media and portable electronic devices (PEDs)?
Removable media pose more risks than PEDs and are not permitted in government facilities?
Which of the following statements about Protected Health Information (PHI) is true?
It refers to all health information, regardless of the source or recipient.
Does it pose a risk to tap your smartwatch to pay for a purchase at a store?
Only if you do not have two-factor authentication enables on your linked phone
Which of the following is an allowed use of government furnished equipment (GFE)?
E-mailing your supervisor
Based on the description provided, how many insider threat indicators are present? Edward has worked for the DoD agency for 2 years. He is an analyst who takes a great deal of interest in his work. He occasionally takes a somewhat aggressive interest in others' work as well, including asking for classified details of their projects. He otherwise gets along well with his colleagues.
1-2 (Unsure) Ref: Cyber Awareness Challenge 2025 / Detecting Insider Threats
How can you protect a mobile device while traveling?
Connect with a Government VPN. (Correct) Ref: Cyber Awareness Challenge 2025 / Traveling with Mobile Devices
What is an insider threat?
Someone who uses authorized access, either wittingly or unwittingly, to harm national security. (Correct) Ref: Cyber Awareness Challenge 2025 / Insider Threat
Which of the following is a best practice for telework and remote work?
Connect to your Government Virtual Private Network (VPN) (Correct) Ref: Cyber Awareness Challenge 2025 / Telework and Home Computer Security
Which of the following is true of spillage?
It can be inadvertent or intentional. (Correct) Ref: Cyber Awareness Challenge 2025 / Spillage
Which of the following would work in combination for two-factor authentication?
Common Access Card (CAC) and Personal Identification Number (PIN) (Correct) Ref: Cyber Awareness Challenge 2025 / Identity Authentication
Under which Cyberspace Protection Condition (CAPCON) is the priority focus limited to critical functions?
CPCON 1 (Correct) Ref: Cyber Awareness Challenge 2025 / Cyberspace Protection Conditions (CPCON)
Which of the following is true of working within a Sensitive Compartmented Information Facility (SCIF)?
Badges must be worn while in the facility and removed when leaving the facility. (Correct) Ref: Cyber Awareness Challenge 2025 / Sensitive Compartmented Information Facilities (SCIFs)
When linked to a specific individual, which of the following is NOT an example of Personally Identifiable Information (PII)?
Smartphone brand and model (Correct) Ref: Cyber Awareness Challenge 2025 / Personally Identifiable Information (PII)
Which is an example of a strong password?
bRobr\@79I\P (Correct) Ref: Cyber Awareness Challenge 2025 / Passwords
Which of the following describes Sensitive Compartmented Information (SCI)?
SCI introduces an overlay of security to Top Secret, Secret, and Confidential information. (Correct) Ref: Cyber Awareness Challenge 2025 / Sensitive Compartmented Information (SCI)
When is the safest time to post on social media about your work-related travel?
After the trip (Correct) Ref: Common Sense
As you browse a social media site, you come across photos of information with classified markings. What should you do?
Notify your security point of contact. (Correct) Ref: Cyber Awareness Challenge 2025 / Responding to Spillage