DOD Cyber Awareness Challenge 2025: Knowledge Check-1 Part 3
This deck covers key concepts from the DOD Cyber Awareness Challenge 2025, including identity authentication, information security, and best practices for handling sensitive information.
Which of the following would work in combination for two-factor authentication?
Common Access Card (CAC) and Personal Identification Number (PIN) (Correct)
Ref: Cyber Awareness Challenge 2025 / Identity Authentication
Key Terms
Which of the following would work in combination for two-factor authentication?
Common Access Card (CAC) and Personal Identification Number (PIN) (Correct)
Ref: Cyber Awareness Challenge 2025 / Identity Authentication
Under which Cyberspace Protection Condition (CAPCON) is the priority focus limited to critical functions?
CPCON 1 (Correct)
Ref: Cyber Awareness Challenge 2025 / Cyberspace Protection Conditions (CPCON)
Which of the following is true of working within a Sensitive Compartmented Information Facility (SCIF)?
Badges must be worn while in the facility and removed when leaving the facility. (Correct)
Ref: Cyber Awareness Challenge 2025 / Sensitive C...
When linked to a specific individual, which of the following is NOT an example of Personally Identifiable Information (PII)?
Smartphone brand and model (Correct)
Ref: Cyber Awareness Challenge 2025 / Personally Identifiable Information (PII)
Which is an example of a strong password?
bRobr@79I*P (Correct)
Ref: Cyber Awareness Challenge 2025 / Passwords
Which of the following describes Sensitive Compartmented Information (SCI)?
SCI introduces an overlay of security to Top Secret, Secret, and Confidential information. (Correct)
Ref: Cyber Awareness Challenge 2025 / S...
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
Which of the following would work in combination for two-factor authentication? | Common Access Card (CAC) and Personal Identification Number (PIN) (Correct) |
Under which Cyberspace Protection Condition (CAPCON) is the priority focus limited to critical functions? | CPCON 1 (Correct) |
Which of the following is true of working within a Sensitive Compartmented Information Facility (SCIF)? | Badges must be worn while in the facility and removed when leaving the facility. (Correct) |
When linked to a specific individual, which of the following is NOT an example of Personally Identifiable Information (PII)? | Smartphone brand and model (Correct) |
Which is an example of a strong password? | bRobr@79I*P (Correct) |
Which of the following describes Sensitive Compartmented Information (SCI)? | SCI introduces an overlay of security to Top Secret, Secret, and Confidential information. (Correct) |
When is the safest time to post on social media about your work-related travel? | After the trip (Correct) |
As you browse a social media site, you come across photos of information with classified markings. What should you do? | Notify your security point of contact. (Correct) |
Which of the following is a best practice for physical security? | Report suspicious activity. (Correct) |
Who designates whether information is classified and its classification level? | Original classification authority (Correct) |
You receive a text message from a vendor notifying you that your order is on hold due to needing updated payment information from you. It provides a shortened link for you to provide the needed information. What is the best course of action? | Delete the message (Correct) |
Which of the following is permitted within a Sensitive Compartmented Information Facility (SCIF)? | An authorized Government-owned Portable Electronic Device (PED) (Correct) |
Which of the following is a best practice for using government e-mail? | Do not solicit sales. (Correct) |
How can malicious code do damage? | All of these. (Correct) |
Which of the following can be used to catalogue information about you? | All of these. (Correct) |
Which of the following personally owned peripherals can you use with government furnished equipment (GFE)? | A wired keyboard connection via USB. (Correct) |
Which of the following statements is true of DoD Unclassified data? | It must be cleared before being released to the public. (Correct) |
As you scroll through your social media feed, a news headline catches your eye. What should you consider before sharing it with your connections? | Whether the source is credible and reliable. (Correct) |
Which of the following is the safest to share on a social networking site? | Your favorite movie. (Correct) |
Which of the following uses of removable media is allowed? | Sam uses approved Government owned removable media to transfer files between government systems as authorized. (Correct) |
Which of the following provides comprehensive guidance regarding specific program, system, operation, or weapon system elements of information to be classified? | Security Classification Guide. (Correct) |
Which of the following is true of transmitting or transporting Sensitive Compartmented Information (SCI)? | You must be courier-briefed for SCI to transport it. (Correct) |
Adam sees a coworker who does not have the required clearance with a printed document marked as Sensitive Compartmented Information (SCI). What should he do? | Contact his security POC and report the incident. (Correct) |
Which of the following is true of Controlled Unclassified Information (CUI)? | It belongs to a defined category established in the DoD CUI Registry. (Correct) |