Back to AI Flashcard MakerInformation Technology /DOD Cyber Awareness Challenge 2025: Knowledge Check-1 Part 3

DOD Cyber Awareness Challenge 2025: Knowledge Check-1 Part 3

Information Technology24 CardsCreated 5 months ago

This deck covers key concepts from the DOD Cyber Awareness Challenge 2025, including identity authentication, information security, and best practices for handling sensitive information.

Which of the following would work in combination for two-factor authentication?

Common Access Card (CAC) and Personal Identification Number (PIN) (Correct)

Ref: Cyber Awareness Challenge 2025 / Identity Authentication

Tap or swipe ↕ to flip
Swipe ←→Navigate
1/24

Key Terms

Term
Definition

Which of the following would work in combination for two-factor authentication?

Common Access Card (CAC) and Personal Identification Number (PIN) (Correct)

Ref: Cyber Awareness Challenge 2025 / Identity Authentication

Under which Cyberspace Protection Condition (CAPCON) is the priority focus limited to critical functions?

CPCON 1 (Correct)

Ref: Cyber Awareness Challenge 2025 / Cyberspace Protection Conditions (CPCON)

Which of the following is true of working within a Sensitive Compartmented Information Facility (SCIF)?

Badges must be worn while in the facility and removed when leaving the facility. (Correct)

Ref: Cyber Awareness Challenge 2025 / Sensitive C...

When linked to a specific individual, which of the following is NOT an example of Personally Identifiable Information (PII)?

Smartphone brand and model (Correct)

Ref: Cyber Awareness Challenge 2025 / Personally Identifiable Information (PII)

Which is an example of a strong password?

bRobr@79I*P (Correct)

Ref: Cyber Awareness Challenge 2025 / Passwords

Which of the following describes Sensitive Compartmented Information (SCI)?

SCI introduces an overlay of security to Top Secret, Secret, and Confidential information. (Correct)

Ref: Cyber Awareness Challenge 2025 / S...

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition

Which of the following would work in combination for two-factor authentication?

Common Access Card (CAC) and Personal Identification Number (PIN) (Correct)

Ref: Cyber Awareness Challenge 2025 / Identity Authentication

Under which Cyberspace Protection Condition (CAPCON) is the priority focus limited to critical functions?

CPCON 1 (Correct)

Ref: Cyber Awareness Challenge 2025 / Cyberspace Protection Conditions (CPCON)

Which of the following is true of working within a Sensitive Compartmented Information Facility (SCIF)?

Badges must be worn while in the facility and removed when leaving the facility. (Correct)

Ref: Cyber Awareness Challenge 2025 / Sensitive Compartmented Information Facilities (SCIFs)

When linked to a specific individual, which of the following is NOT an example of Personally Identifiable Information (PII)?

Smartphone brand and model (Correct)

Ref: Cyber Awareness Challenge 2025 / Personally Identifiable Information (PII)

Which is an example of a strong password?

bRobr@79I*P (Correct)

Ref: Cyber Awareness Challenge 2025 / Passwords

Which of the following describes Sensitive Compartmented Information (SCI)?

SCI introduces an overlay of security to Top Secret, Secret, and Confidential information. (Correct)

Ref: Cyber Awareness Challenge 2025 / Sensitive Compartmented Information (SCI)

When is the safest time to post on social media about your work-related travel?

After the trip (Correct)

Ref: Common Sense

As you browse a social media site, you come across photos of information with classified markings. What should you do?

Notify your security point of contact. (Correct)

Ref: Cyber Awareness Challenge 2025 / Responding to Spillage

Which of the following is a best practice for physical security?

Report suspicious activity. (Correct)

Ref: Cyber Awareness Challenge 2025 / Physical Security

Who designates whether information is classified and its classification level?

Original classification authority (Correct)

Ref: Cyber Awareness Challenge 2025 / Classified Data

You receive a text message from a vendor notifying you that your order is on hold due to needing updated payment information from you. It provides a shortened link for you to provide the needed information. What is the best course of action?

Delete the message (Correct)

Ref: Cyber Awareness Challenge 2025 / Smishing

Which of the following is permitted within a Sensitive Compartmented Information Facility (SCIF)?

An authorized Government-owned Portable Electronic Device (PED) (Correct)

Ref: Cyber Awareness Challenge 2025 / SCIFs and Portable Electronic Devices (PEDs)

Which of the following is a best practice for using government e-mail?

Do not solicit sales. (Correct)

Ref: Cyber Awareness Challenge 2025 / Use of Government E-mail

How can malicious code do damage?

All of these. (Correct)

Ref: Cyber Awareness Challenge 2025 / Malicious Code

Which of the following can be used to catalogue information about you?

All of these. (Correct)

Ref: Cyber Awareness Challenge 2025 / Online Identity

Which of the following personally owned peripherals can you use with government furnished equipment (GFE)?

A wired keyboard connection via USB. (Correct)

Ref: Cyber Awareness Challenge 2025 / Peripherals

Which of the following statements is true of DoD Unclassified data?

It must be cleared before being released to the public. (Correct)

Ref: Cyber Awareness Challenge 2025 / Unclassified Information

As you scroll through your social media feed, a news headline catches your eye. What should you consider before sharing it with your connections?

Whether the source is credible and reliable. (Correct)

Ref: Cyber Awareness Challenge 2025 / Disinformation

Which of the following is the safest to share on a social networking site?

Your favorite movie. (Correct)

Ref: Cyber Awareness Challenge 2025 / Social Networking: Protect Yourself

Which of the following uses of removable media is allowed?

Sam uses approved Government owned removable media to transfer files between government systems as authorized. (Correct)

Ref: Cyber Awareness Challenge 2025 / Appropriate Use of Removable Media

Which of the following provides comprehensive guidance regarding specific program, system, operation, or weapon system elements of information to be classified?

Security Classification Guide. (Correct)

Ref: Cyber Awareness Challenge 2025 / Marking SCI

Which of the following is true of transmitting or transporting Sensitive Compartmented Information (SCI)?

You must be courier-briefed for SCI to transport it. (Correct)

Ref: Cyber Awareness Challenge 2025 / Transmitting SCI

Adam sees a coworker who does not have the required clearance with a printed document marked as Sensitive Compartmented Information (SCI). What should he do?

Contact his security POC and report the incident. (Correct)

Ref: Common Sense

Which of the following is true of Controlled Unclassified Information (CUI)?

It belongs to a defined category established in the DoD CUI Registry. (Correct)

Ref: Cyber Awareness Challenge 2025 / Controlled Unclassified Information (CUI)