US Navy Cyber Awareness Challenge 2025 Part 1
This flashcard highlights reportable behaviors in a cybersecurity context. It emphasizes that bringing a phone into a prohibited area is a security violation and must be reported, as it poses a risk to classified or sensitive environments.
Which of the following is an example of behavior that you should report?
-Planning an overseas vacation
-Drinking alcohol socially
-Expressing dislike of a recent Presidential action
-Bringing a phone into a prohibited area
Bringing a phone into a prohibited area
Key Terms
Which of the following is an example of behavior that you should report?
-Planning an overseas vacation
-Drinking alcohol socially
-Expressing dislike of a recent Presidential action
-Bringing a phone into a prohibited area
Bringing a phone into a prohibited area
You receive an e-mail with a link to run an anti-virus scan. Your IT department has not sent links like this in the past. The e-mail is not digitally signed. What action should you take?
-Select the link to run the anti-virus scan.
-Look for a phone number in the e-mail to call for more information.
-Report the e-mail to your security POC or help desk.
-Reply to the e-mail to request more information.
Report the e-mail to your security POC or help desk.
Which of the following is an example of a strong password?
-bRobr@79I*P
-Fluffy&Spot
-Password12345
-1965May31!
bRobr@79I*P
Which of the following can be used to catalogue information about you?
-Social networking sites
-Audio-enabled digital assistants (e.g., Siri, Alexa)
-Fitness trackers
-All of these
All of these
Which of the following is a best practice to protect your identity?
-Throw credit card and bank statement in the trash
-Carry your passport with you at all times
-Enable data aggregation on sites when possible
-Ask how information will be used before giving it out
Ask how information will be used before giving it out
Which of the following describes Sensitive Compartmented Information (SCI)?
-The requirement for access to SCI material are security clearance eligibility and need-to-know
-SCI introduces an overlay of security to Top Secret, Secret, and Confidential information.
-The determination that a piece of information is SCI is made at the organizational level.
-SCI is a type of Controlled Unclassified Information (CUI).
SCI introduces an overlay of security to Top Secret, Secret, and Confidential information.
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
Which of the following is an example of behavior that you should report? | Bringing a phone into a prohibited area |
You receive an e-mail with a link to run an anti-virus scan. Your IT department has not sent links like this in the past. The e-mail is not digitally signed. What action should you take? | Report the e-mail to your security POC or help desk. |
Which of the following is an example of a strong password? | bRobr@79I*P |
Which of the following can be used to catalogue information about you? | All of these |
Which of the following is a best practice to protect your identity? | Ask how information will be used before giving it out |
Which of the following describes Sensitive Compartmented Information (SCI)? | SCI introduces an overlay of security to Top Secret, Secret, and Confidential information. |
Which of the following is the safest to share on a social media networking site? | Your favorite movie |
You receive a text message from a vendor notifying you that your order is on hold due to needing updated payment information from you. It provides a shortened link for you to provide the needed information. What is the best course of action? | Delete the message |
Which of these is NOT a potential indicator that your device may be under a malicious code attack? | An operating system update |
What is a best practice for creating user accounts for your home computer? | Create separate accounts for each user and have each user create their own password |
Which of the following is permitted when using an unclassified laptop within a collateral classified space? | A personally-owned wired headset without a microphone |
Which of the following is an allowed use of government furnished equipment (GFE)? | E-mailing your supervisor |
Which of the following is true of removable media and portable electronic devices (PEDs)? | The risk associated with them may lead to loss of life. |
Which of the following provides precise, comprehensive guidance regarding specific program, system, operation, or weapon system elements of information to be classified? | Security Classification Guide |
How can you protect data on a mobile device? | Use two-factor authentication |
Which of the following is true of compressed URLs (e.g., Tiny URL, goo.gl)? | They may be used to mask malicious intent |
Which type of data could reasonably be expected to cause damage to national security? | Confidential |
Which of the following is a best practice for physical security? | Report suspicious activity |
Which of the following statement is true of DoD Unclassified data? | It must be cleared before being released to the public. |
How can you protect a mobile device while traveling? | Connect with a Government VPN |
How can you protect your home computer? | Install spyware protection software |
How can you protect your home computer? | Use legitimate, known antivirus software |
Which of the following is true of spillage? | It can be either inadvertent or intentional. |
Which of the following personally owned peripherals can you use with government furnished equipment (GFE)? | A wired keyboard connected via USB |
How can you protect yourself from identity theft? | Review your credit report annually |
Which of the following is a way to protect classified data? | Store it in a GSA-approved container |
What are the requirements for access to Sensitive Compartmented Information (SCI)? | Top Secret clearance and indoctrination into the SCI program |
Which of the following poses a security risk while teleworking in an environment where Internet of Things (IoT) devices are present? | All of these |
Which of the following is an example of removable media? | Compact disc |
Tessa is processing payroll data that includes employees' names, home addresses, and salary. Which of the following is Tessa prohibited from doing with the data? | Using her home computer to print the data while working remotely |