Back to AI Flashcard MakerInformation Technology /DOD Cyber Awareness Challenge 2025 Knowledge check-1 Part 2

DOD Cyber Awareness Challenge 2025 Knowledge check-1 Part 2

Information Technology20 CardsCreated 5 months ago

This deck covers the key concepts and safety practices from the DOD Cyber Awareness Challenge 2025, focusing on social networking, mobile security, insider threats, and more.

How can you protect yourself on social networking sites?

Validate connection requests through another source if possible. (Correct)

Ref: Cyber Awareness Challenge 2025 / Social Networking: Protect Yourself

Tap or swipe ↕ to flip
Swipe ←→Navigate
1/20

Key Terms

Term
Definition

How can you protect yourself on social networking sites?

Validate connection requests through another source if possible. (Correct)

Ref: Cyber Awareness Challenge 2025 / Social Networking: Protect ...

How can you protect data on a mobile device?

Use two-factor authentication (Correct)

Ref: Cyber Awareness Challenge 2025 / Protecting Data on Mobile Devices and PEDs

You receive an e-mail marked important from your agency head asking you to call them using a number you do not recognize. The e-mail was sent from a personal e-mail address that you do not recognize, but it addresses you by name. What action should you take?

This may be a spear phishing attempt. Report it to your security POC or help desk. (Correct)

Ref: Cyber Awareness Challenge 2025 / Spear Phi...

Which of the following is permitted when using an unclassified laptop within a collateral classified space?

A personally-owned wired headset without a microphone (Correct)

Ref: Cyber Awareness Challenge 2025 / Collateral Classified Spaces

Tessa is processing payroll data that includes employees' names, home addresses, and salary. Which of the following is Tessa prohibited from doing with the data?

Using her home computer to print the data while working remotely. (Correct)

Ref: Cyber Awareness Challenge 2025 / Telework and Home Computer...

Which type of data could reasonably be expected to cause damage to national security?

Confidential (Correct)

Ref: Cyber Awareness Challenge 2025 / Classified Data

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition

How can you protect yourself on social networking sites?

Validate connection requests through another source if possible. (Correct)

Ref: Cyber Awareness Challenge 2025 / Social Networking: Protect Yourself

How can you protect data on a mobile device?

Use two-factor authentication (Correct)

Ref: Cyber Awareness Challenge 2025 / Protecting Data on Mobile Devices and PEDs

You receive an e-mail marked important from your agency head asking you to call them using a number you do not recognize. The e-mail was sent from a personal e-mail address that you do not recognize, but it addresses you by name. What action should you take?

This may be a spear phishing attempt. Report it to your security POC or help desk. (Correct)

Ref: Cyber Awareness Challenge 2025 / Spear Phishing

Which of the following is permitted when using an unclassified laptop within a collateral classified space?

A personally-owned wired headset without a microphone (Correct)

Ref: Cyber Awareness Challenge 2025 / Collateral Classified Spaces

Tessa is processing payroll data that includes employees' names, home addresses, and salary. Which of the following is Tessa prohibited from doing with the data?

Using her home computer to print the data while working remotely. (Correct)

Ref: Cyber Awareness Challenge 2025 / Telework and Home Computer Security

Which type of data could reasonably be expected to cause damage to national security?

Confidential (Correct)

Ref: Cyber Awareness Challenge 2025 / Classified Data

Which of the following is true of Sensitive Compartmented Information Facilities (SCIFs)?

Personnel should physically assess whether everyone within listening distance has a need-to-know before starting conversations involving classified information. (Correct)

Ref: Cyber Awareness Challenge 2025 / SCIF Situational Awareness

When allowed, which of the following is an appropriate use of removable media?

Labeling media that contains personally identifiable information (PII) (Correct)

Ref: Cyber Awareness Challenge 2025 / Appropriate Use of Removable Media

Which of the following is a potential Insider threat indicator?

Death of spouse. (Correct)

Ref: Cyber Awareness Challenge 2025 / personnel Detecting Insider Threats

Which of the following is a best practice when browsing the Internet?

Look for h-t-t-p-s in the URL name. (Correct)

Ref: Cyber Awareness Challenge 2025 / Web Use and Your Safety

Which of the following is a best practice for protecting your home wireless network for telework or remote work?

Implement, as a minimum, Wi-Fi Protected Access 2 (WPA2) Personal encryption. (Correct)

Ref: Cyber Awareness Challenge 2025 / Wireless Network

Which of the following is true of removable media and portable electronic devices (PEDs)?

The risk associated with them may lead to loss of life. (Correct)

Ref: Cyber Awareness Challenge 2025 / Removable Media, PEDs, and Mobile Devices

Which of the following statements about Protected Health Information (PHI) is true?

It is health information that identifies the individual. (Correct)

Ref: Cyber Awareness Challenge 2025 / Protected Health Information (PHI)

Does it pose a risk to tap your smartwatch to pay for a purchase at a store?

Yes, there is a risk that the signal could be intercepted and altered. (Correct)

Ref: Cyber Awareness Challenge 2025 / Near Field Communication (NFC)

Which of the following is an allowed use of government furnished equipment (GFE)?

E-mailing your supervisor (Correct)

Ref: Cyber Awareness Challenge 2025 / Ethical Use of Government-Furnished Equipment (GFE)

Based on the description provided, how many insider threat indicators are present? Edward has worked for the DoD agency for 2 years. He is an analyst who takes a great deal of interest in his work. He occasionally takes a somewhat aggressive interest in others' work as well, including asking for classified details of their projects. He otherwise gets along well with his colleagues.

1 (Correct)


Ref: Cyber Awareness Challenge 2025 / Detecting Insider Threats

How can you protect a mobile device while traveling?

Connect with a Government VPN. (Correct)

Ref: Cyber Awareness Challenge 2025 / Traveling with Mobile Devices

What is an insider threat?

Someone who uses authorized access, either wittingly or unwittingly, to harm national security. (Correct)

Ref: Cyber Awareness Challenge 2025 / Insider Threat

Which of the following is a best practice for telework and remote work?

Connect to your Government Virtual Private Network (VPN) (Correct)

Ref: Cyber Awareness Challenge 2025 / Telework and Home Computer Security

Which of the following is true of spillage?

It can be either inadvertent or intentional. (Correct)

Ref: Cyber Awareness Challenge 2025 / Spillage