US Navy Cyber Awareness Challenge 2025 Part 3
This flashcard addresses proper protection of your Common Access Card (CAC) or Personal Identity Verification (PIV) card. It underscores the importance of safeguarding these credentials and using them only for authorized purposes, not as casual ID.
*Identity Authentication
Charlie
How do you protect your Common Access Card (CAC) or personal Identity Verification (PIV) Card?
I use my CAC occasionally as a secondary photo identification.
-Yes
-Maybe
-No
Maybe
Key Terms
*Identity Authentication
Charlie
How do you protect your Common Access Card (CAC) or personal Identity Verification (PIV) Card?
I use my CAC occasionally as a secondary photo identification.
-Yes
-Maybe
-No
Maybe
*Identity Authentication
Select the individual who securely authenticates their identity.
-Alex
-Bailey
-Charlie
Alex
*Malicious Code
How can malicious code spread? Select all that apply. Then select submit.
-E-mail attachments
-Downloading files
-Visiting infected websites
-Virus scans
-E-mail attachments
-Downloading files
-Visiting infected websites
*Malicious Code
How can you prevent the download of malicious code? Select all that apply. Then select submit.
-Scan external files before uploading to your device
-Research apps and their vulnerabilities before downloading
-Use the Preview Pane to view e-mails
-Disable automatic security patches
-Scan external files before uploading to your device
-Research apps and their vulnerabilities before downloading
*Malicious Code
Which of the following may indicate a malicious code attack? Select all that apply. Then select submit.
-The device re-starts following a system update.
-A new app suddenly appears on the device.
-The device slows down.
-A new tab appears in the Web browser.
-A new app suddenly appears on the device.
-The device slows down.
-A new tab appears in the Web browser.
*Social Engineering
DoD IT. Alert: E-mail Storage Quota Exceeded
How many social engineering indicators are present in this e-mail?
-0
-1
-2
-3+
3+
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
*Identity Authentication Charlie How do you protect your Common Access Card (CAC) or personal Identity Verification (PIV) Card? I use my CAC occasionally as a secondary photo identification. -Yes -Maybe -No | Maybe |
*Identity Authentication Select the individual who securely authenticates their identity. -Alex -Bailey -Charlie | Alex |
*Malicious Code | -E-mail attachments |
*Malicious Code | -Scan external files before uploading to your device |
*Malicious Code | -A new app suddenly appears on the device. |
*Social Engineering | 3+ |
*Social Engineering | 3+ |
*Removable Media | Turn it in to your security officer |
*Mobile Devices | Cash |
*Mobile Devices | Approved mobile hotspot |
*Mobile Devices | Leave the coffee shop |
*Social Networking | Delete |
*Social Networking Shaun S. 2 shared connections -Deny -Accept | Deny |
*Social Networking Important info for everyone! I had no idea. -Keep Scrolling -Re-post | Keep Scrolling |
*Website Use Did you hear about this? They are trying to move Thanksgiving to March instead of November! Sign the petition and make a donation to stop this. -Research Claim -Research Link -Open Link | Research Claim |
*Identity Management True or false? Voice-activated smart devices can collect and share your personal information. -True -False | True |
*Identity Management True or false? The best way to keep your passport safe is to carry it with you? -True -False | False |
*Identity Management | True |
*Insider Threat | Yes |
*Insider Threat | Report Bob |
*Telework | Secure the area so others cannot view your monitor |
*Telework | -HDMI monitor |
*Telework | Yes |
*Home Computer Security | Yes |
*Home Computer Security | Yes |
*Home Computer Security | Yes |
When allowed, which of the following is an appropriate use of removable media? | Labeling media that contains personally identifiable information (PII) |
How can you prevent viruses and malicious code? | Scan all e-mail attachments |
You receive a phone call from an unknown person asking for a directory name on your government furnished laptop so that a software can be made. Which course of action should you take? | Document the interaction and contact your security POC or help desk |
Which of the following is a best practice for protecting your home wireless network for telework or remote work? | Turn off all other devices that connect to your router while working |
How can you protect yourself on social networking sites? | Validate connection requests through another source if possible |