Back to AI Flashcard MakerInformation Technology /US Navy Cyber Awareness Challenge 2025 Part 3

US Navy Cyber Awareness Challenge 2025 Part 3

Information Technology31 CardsCreated 4 months ago

This flashcard addresses proper protection of your Common Access Card (CAC) or Personal Identity Verification (PIV) card. It underscores the importance of safeguarding these credentials and using them only for authorized purposes, not as casual ID.

*Identity Authentication

Charlie

How do you protect your Common Access Card (CAC) or personal Identity Verification (PIV) Card?

I use my CAC occasionally as a secondary photo identification.

-Yes

-Maybe

-No

Maybe

Tap or swipe ↕ to flip
Swipe ←→Navigate
1/31

Key Terms

Term
Definition

*Identity Authentication

Charlie

How do you protect your Common Access Card (CAC) or personal Identity Verification (PIV) Card?

I use my CAC occasionally as a secondary photo identification.

-Yes

-Maybe

-No

Maybe

*Identity Authentication

Select the individual who securely authenticates their identity.

-Alex

-Bailey

-Charlie

Alex

*Malicious Code
How can malicious code spread? Select all that apply. Then select submit.
-E-mail attachments
-Downloading files
-Visiting infected websites
-Virus scans

-E-mail attachments
-Downloading files
-Visiting infected websites

*Malicious Code
How can you prevent the download of malicious code? Select all that apply. Then select submit.
-Scan external files before uploading to your device
-Research apps and their vulnerabilities before downloading
-Use the Preview Pane to view e-mails
-Disable automatic security patches

-Scan external files before uploading to your device
-Research apps and their vulnerabilities before downloading

*Malicious Code
Which of the following may indicate a malicious code attack? Select all that apply. Then select submit.
-The device re-starts following a system update.
-A new app suddenly appears on the device.
-The device slows down.
-A new tab appears in the Web browser.

-A new app suddenly appears on the device.
-The device slows down.
-A new tab appears in the Web browser.

*Social Engineering
DoD IT. Alert: E-mail Storage Quota Exceeded
How many social engineering indicators are present in this e-mail?
-0
-1
-2
-3+

3+

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition

*Identity Authentication

Charlie

How do you protect your Common Access Card (CAC) or personal Identity Verification (PIV) Card?

I use my CAC occasionally as a secondary photo identification.

-Yes

-Maybe

-No

Maybe

*Identity Authentication

Select the individual who securely authenticates their identity.

-Alex

-Bailey

-Charlie

Alex

*Malicious Code
How can malicious code spread? Select all that apply. Then select submit.
-E-mail attachments
-Downloading files
-Visiting infected websites
-Virus scans

-E-mail attachments
-Downloading files
-Visiting infected websites

*Malicious Code
How can you prevent the download of malicious code? Select all that apply. Then select submit.
-Scan external files before uploading to your device
-Research apps and their vulnerabilities before downloading
-Use the Preview Pane to view e-mails
-Disable automatic security patches

-Scan external files before uploading to your device
-Research apps and their vulnerabilities before downloading

*Malicious Code
Which of the following may indicate a malicious code attack? Select all that apply. Then select submit.
-The device re-starts following a system update.
-A new app suddenly appears on the device.
-The device slows down.
-A new tab appears in the Web browser.

-A new app suddenly appears on the device.
-The device slows down.
-A new tab appears in the Web browser.

*Social Engineering
DoD IT. Alert: E-mail Storage Quota Exceeded
How many social engineering indicators are present in this e-mail?
-0
-1
-2
-3+

3+

*Social Engineering
DoD Software. DoD Software share "Approved Software List" with you.
How many social engineering indicators are present in this e-mail?
-0
-1
-2
-3+

3+

*Removable Media
Choose an action!
You find an unlabeled thumb drive in the parking area outside your workplace. What should you do?
-Plug it into your work computer to find out more about it
-Leave it alone
-Turn it in to your security officer

Turn it in to your security officer

*Mobile Devices
Which payment method poses the least risk?
-Cash
-Digital credit card on smartphone

Cash

*Mobile Devices
Which method of getting online poses the least risk?
-Approved mobile hotspot
-Coffee shop Wi-Fi

Approved mobile hotspot

*Mobile Devices
Which action will keep DoD data the safest?
-Change seats
-Leave the coffee shop

Leave the coffee shop

*Social Networking
Everyone should see the new superhero movie! The special effects are fantastic on the big screen!
-Delete
-Post

Delete

*Social Networking

Shaun S.

2 shared connections

-Deny

-Accept

Deny

*Social Networking

Important info for everyone! I had no idea.

-Keep Scrolling

-Re-post

Keep Scrolling

*Website Use

Did you hear about this? They are trying to move Thanksgiving to March instead of November! Sign the petition and make a donation to stop this.

-Research Claim

-Research Link

-Open Link

Research Claim

*Identity Management

True or false? Voice-activated smart devices can collect and share your personal information.

-True

-False

True

*Identity Management

True or false? The best way to keep your passport safe is to carry it with you?

-True

-False

False

*Identity Management
True or false? You should monitor your credit card statements for unauthorized purchases?
-True
-False

True

*Insider Threat
Does Bob demonstrate potential insider threat indicators?
-Yes
-No

Yes

*Insider Threat
How should Bob's colleagues respond?
-Confront Bob
-Report Bob
-Avoid Bob

Report Bob

*Telework
What step should be taken next to securely telework?
-Connect peripherals
-Secure the area so others cannot view your monitor

Secure the area so others cannot view your monitor

*Telework
Which of these personally-owned computer peripherals may be used with government-furnished equipment?
-HDMI monitor
-USB keyboard
-Wireless mouse

-HDMI monitor
-USB keyboard

*Telework
Does this pose a potential security risk?
-Yes
-No

Yes

*Home Computer Security
Virus and Threat Protection
Install?
-Yes
-No

Yes

*Home Computer Security
User Accounts
Create user profile?
-Yes
-No

Yes

*Home Computer Security
Firewall Protection
Enable?
-Yes
-No

Yes

When allowed, which of the following is an appropriate use of removable media?
-Labeling media that contains personally identifiable information (PII)
-Destroying removable media with a refrigerator magnet
-Downloading data from classified networks
-Discarding unneeded removable media in the trash

Labeling media that contains personally identifiable information (PII)

How can you prevent viruses and malicious code?
-Email infected files to your security POC
-View e-mail using the Preview Pane rather than opening it
Allow mobile code to run on all websites
-Scan all e-mail attachments

Scan all e-mail attachments

You receive a phone call from an unknown person asking for a directory name on your government furnished laptop so that a software can be made. Which course of action should you take?
-Document the interaction and contact your security POC or help desk
-Provide the information but decline to update the software
-Provide the information and follow instructions
-End the call with no further action

Document the interaction and contact your security POC or help desk

Which of the following is a best practice for protecting your home wireless network for telework or remote work?
-Implement, as a minimum, Wi-Fi Protected Access 2 (WPA2) Personal encryption
-Use your router's pre-set Service Set Identifier (SSID) and password
-Turn off all other devices that connect to your router while working
-Open access to your network to all devices

Turn off all other devices that connect to your router while working

How can you protect yourself on social networking sites?
-Turn on Global Positioning System (GPS) location geotagging
-Assume that people are who they say they are on social networking sites
-Validate connection requests through another source if possible
=Establish privacy settings and assume the available options will remain consistent

Validate connection requests through another source if possible