Back to AI Flashcard MakerInformation Technology /US Navy Cyber Awareness Challenge 2025 Part 1

US Navy Cyber Awareness Challenge 2025 Part 1

Information Technology30 CardsCreated 4 months ago

This flashcard highlights reportable behaviors in a cybersecurity context. It emphasizes that bringing a phone into a prohibited area is a security violation and must be reported, as it poses a risk to classified or sensitive environments.

Which of the following is an example of behavior that you should report?

-Planning an overseas vacation
-Drinking alcohol socially
-Expressing dislike of a recent Presidential action
-Bringing a phone into a prohibited area

Bringing a phone into a prohibited area

Tap or swipe ↕ to flip
Swipe ←→Navigate
1/30

Key Terms

Term
Definition

Which of the following is an example of behavior that you should report?

-Planning an overseas vacation
-Drinking alcohol socially
-Expressing dislike of a recent Presidential action
-Bringing a phone into a prohibited area

Bringing a phone into a prohibited area

You receive an e-mail with a link to run an anti-virus scan. Your IT department has not sent links like this in the past. The e-mail is not digitally signed. What action should you take?

-Select the link to run the anti-virus scan.
-Look for a phone number in the e-mail to call for more information.
-Report the e-mail to your security POC or help desk.
-Reply to the e-mail to request more information.

Report the e-mail to your security POC or help desk.

Which of the following is an example of a strong password?

-bRobr@79I*P
-Fluffy&Spot
-Password12345
-1965May31!

bRobr@79I*P

Which of the following can be used to catalogue information about you?

-Social networking sites
-Audio-enabled digital assistants (e.g., Siri, Alexa)
-Fitness trackers
-All of these

All of these

Which of the following is a best practice to protect your identity?

-Throw credit card and bank statement in the trash
-Carry your passport with you at all times
-Enable data aggregation on sites when possible
-Ask how information will be used before giving it out

Ask how information will be used before giving it out

Which of the following describes Sensitive Compartmented Information (SCI)?

-The requirement for access to SCI material are security clearance eligibility and need-to-know
-SCI introduces an overlay of security to Top Secret, Secret, and Confidential information.
-The determination that a piece of information is SCI is made at the organizational level.
-SCI is a type of Controlled Unclassified Information (CUI).

SCI introduces an overlay of security to Top Secret, Secret, and Confidential information.

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition

Which of the following is an example of behavior that you should report?

-Planning an overseas vacation
-Drinking alcohol socially
-Expressing dislike of a recent Presidential action
-Bringing a phone into a prohibited area

Bringing a phone into a prohibited area

You receive an e-mail with a link to run an anti-virus scan. Your IT department has not sent links like this in the past. The e-mail is not digitally signed. What action should you take?

-Select the link to run the anti-virus scan.
-Look for a phone number in the e-mail to call for more information.
-Report the e-mail to your security POC or help desk.
-Reply to the e-mail to request more information.

Report the e-mail to your security POC or help desk.

Which of the following is an example of a strong password?

-bRobr@79I*P
-Fluffy&Spot
-Password12345
-1965May31!

bRobr@79I*P

Which of the following can be used to catalogue information about you?

-Social networking sites
-Audio-enabled digital assistants (e.g., Siri, Alexa)
-Fitness trackers
-All of these

All of these

Which of the following is a best practice to protect your identity?

-Throw credit card and bank statement in the trash
-Carry your passport with you at all times
-Enable data aggregation on sites when possible
-Ask how information will be used before giving it out

Ask how information will be used before giving it out

Which of the following describes Sensitive Compartmented Information (SCI)?

-The requirement for access to SCI material are security clearance eligibility and need-to-know
-SCI introduces an overlay of security to Top Secret, Secret, and Confidential information.
-The determination that a piece of information is SCI is made at the organizational level.
-SCI is a type of Controlled Unclassified Information (CUI).

SCI introduces an overlay of security to Top Secret, Secret, and Confidential information.

Which of the following is the safest to share on a social media networking site?

-Your birthdate
-Your mother's maiden name
-Your favorite movie
-Your current location

Your favorite movie

You receive a text message from a vendor notifying you that your order is on hold due to needing updated payment information from you. It provides a shortened link for you to provide the needed information. What is the best course of action?

-Open the link to provide information
-Reply to the message and ask for more information
-Delete the message
-Open the link to inspect the website

Delete the message

Which of these is NOT a potential indicator that your device may be under a malicious code attack?

-The device slows down
-Loss of control of the mouse or keyboard
-A strange pop-up during system startup
-An operating system update

An operating system update

What is a best practice for creating user accounts for your home computer?

-Do not share your home computer with any other user
-Create separate accounts for each user and tailor each password wo what will be easy for the individual user to remember
-Set up a generic user account with no password for general user functions
-Create separate accounts for each user and have each user create their own password

Create separate accounts for each user and have each user create their own password

Which of the following is permitted when using an unclassified laptop within a collateral classified space?

-A Government-issued wireless headset with a microphone
-A microphone embedded in the laptop
-A personally-owned wired headset without a microphone
-A Government-issued wireless headset without microphone

A personally-owned wired headset without a microphone

Which of the following is an allowed use of government furnished equipment (GFE)?

-Conducting transactions on your side business
-Viewing family photos from your shared DropBox
-Lending it to your spouse to watcha movie
-E-mailing your supervisor

E-mailing your supervisor

Which of the following is true of removable media and portable electronic devices (PEDs)?

-The risk associated with them may lead to loss of life.
-They cannot be adequately secured, so they are prohibited by the DoD.
-Removable media pose more risk than PEDs and are not permitted in government facilities.
-Their utility outweighs any risk associated with them.

The risk associated with them may lead to loss of life.

Which of the following provides precise, comprehensive guidance regarding specific program, system, operation, or weapon system elements of information to be classified?

-Classification Management Tool
-Local Security Official
-Security Classification Guide
-Classification Registry

Security Classification Guide

How can you protect data on a mobile device?

-Use two-factor authentication
-Store your data on a commercial cloud application
-Disable automatic screen locking after a period of inactivity
-Turn over your device as requested by authority figures

Use two-factor authentication

Which of the following is true of compressed URLs (e.g., Tiny URL, goo.gl)?

-You must open the link to find out where it leads.
-You can hover your cursor over it to preview where it actually leads.
-They pose no risk.
-They may be used to mask malicious intent

They may be used to mask malicious intent

Which type of data could reasonably be expected to cause damage to national security?
-Secret
-Confidential
-Controlled Unclassified Information (CUI)
-Top Secret

Confidential

Which of the following is a best practice for physical security?
-Only hold the door for coworkers that you know work in the facility
-Post access rosters in a visible area outside the facility
-Lock your security badges away and avoid wearing it while in the facility
-Report suspicious activity

Report suspicious activity

Which of the following statement is true of DoD Unclassified data?
-It does not require access or distribution controls.
-It must be cleared before being released to the public.
-It poses no risk to the safety of government personnel, mission, or systems.
-It does not require classification markings.

It must be cleared before being released to the public.

How can you protect a mobile device while traveling?

-Only use public Wi-Fi offered by established businesses
-Only make voice calls, as they are more secure than data transmissions
-Connect with a Government VPN
-Store the device in a hotel safe when sightseeing

Connect with a Government VPN

How can you protect your home computer?

-Turn off antivirus software scans
-Install spyware protection software
-Disable firewall protection
-Accept all mobile code

Install spyware protection software

How can you protect your home computer?

-Use the administration account for all users
-Disable the password feature
-Decline security updates
-Use legitimate, known antivirus software

Use legitimate, known antivirus software

Which of the following is true of spillage?

-It occurs when authorization to transfer information is granted and then later revoked.
-It describes information that is "spilled" to either a lower or higher protection level.
-It refers specifically to classified information that becomes publicly available.
-It can be either inadvertent or intentional.

It can be either inadvertent or intentional.

Which of the following personally owned peripherals can you use with government furnished equipment (GFE)?

-A wired keyboard connected via USB
-A wired webcam that requires installed drivers
-A Bluetooth headset
-A monitor connected via USB

A wired keyboard connected via USB

How can you protect yourself from identity theft?

-Share passwords and PINs in your household
-Review your credit report annually
-Scan personal documents before discarding them
-Segregate the data collected by your apps and devices

Review your credit report annually

Which of the following is a way to protect classified data?

-Remove classification markings when transporting it
-Store it in a GSA-approved container
-Use a classified network for unclassified work
-Destroy inappropriately marked material

Store it in a GSA-approved container

What are the requirements for access to Sensitive Compartmented Information (SCI)?

-The access caveats specified by the Direct of National Intelligence
-The appropriate level of security clearance eligibility and a need-to-know
-Top Secret clearance and indoctrination into the SCI program
-Secret clearance and a signed nondisclosure agreement (NDA)

Top Secret clearance and indoctrination into the SCI program

Which of the following poses a security risk while teleworking in an environment where Internet of Things (IoT) devices are present?

-Voice-enabled listening recording
-Default IoT device passwords
-Unknown devices connected via Bluetooth
-All of these

All of these

Which of the following is an example of removable media?

-Smartphone
-Laptop
-Compact disc
-Fitness band

Compact disc

Tessa is processing payroll data that includes employees' names, home addresses, and salary. Which of the following is Tessa prohibited from doing with the data?

-Using her home computer to print the data while working remotely
-Storing it in her locked desk drawer after working hours
-Securely e-mailing it to a colleague who needs to provide missing data
-Encrypting it

Using her home computer to print the data while working remotely