Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

DOD CYBER AWARENESS CHALLENGE KNOWLEDGE CHECK TEST QUIDE QUESTIONS AND ANSWERS

Beoordeling
-
Verkocht
-
Pagina's
6
Geüpload op
18-01-2026
Geschreven in
2025/2026

DOD CYBER AWARENESS CHALLENGE KNOWLEDGE CHECK TEST QUIDE QUESTIONS AND ANSWERS

Instelling
DOD Cyber Awareness
Vak
DOD Cyber Awareness

Voorbeeld van de inhoud

DOD CYBER AWARENESS CHALLENGE
KNOWLEDGE CHECK TEST QUIDE
QUESTIONS AND ANSWERS
Matt is a government employee who needs to share a document containing source
selection data with his supervisor. Which of the following describes the most appropriate
way for Matt to do this? - ANSWER -Encrypt it and send it via digitally signed
Government e-mail. (Correct)

Ref: Cyber Awareness Challenge 2025 / Protecting PII/PHI

You receive an e-mail with a link to run an anti-virus scan. Your IT department has not
sent links like this in the past. The e-mail is not digitally signed. What action should you
take? - ANSWER -Report the e-mail to your security POC or help desk. (Correct)

Ref: Cyber Awareness Challenge 2025 / Phishing

Which of the following is a way to protect classified data? - ANSWER -Store it in a GSA-
approved container

How can you protect yourself from identity theft? - ANSWER -Review your credit report
annually

How can you protect your home computer? - ANSWER -Use legitimate, known antivirus
software (Correct)
Install spyware protection software. (Correct)

Ref: Cyber Awareness Challenge 2025 / Best Practices for Home Computer Security

Which of the following poses a security risk while teleworking in an environment where
Internet of Things (IoT) devices are present? - ANSWER -All of these.

Which of these is NOT a potential indicator that your device may be under a malicious
code attack? - ANSWER -An operating system update (Correct)

Ref: Cyber Awareness Challenge 2025 / Incident Indicators

What are the requirements for access to Sensitive Compartmented Information (SCI)? -
ANSWER -Top Secret clearance and indoctrination into the SCI program

Which of the following is an example of removable media? - ANSWER -Compact disc

, Which of the following is an example of behavior that you should report? - ANSWER -
Bringing a phone into a prohibited area

Which of the following is NOT an appropriate use of your Common Access Card (CAC)?
- ANSWER -Exchanging it for a visitor pass in another building. (Correct)

Ref: Cyber Awareness Challenge 2025 / CAC/PIV Card Protection

You receive a phone call from an unknown person asking for a directory name on your
government furnished laptop so that a software update can be made. Which course of
action should you take? - ANSWER -Document the interaction and contact your security
POC or help desk

How can you protect your home computer? - ANSWER -Install spyware protection
software

Which of the following is an appropriate use of a DoD Public Key Infrastructure (PKI)
token? - ANSWER -Only leave it in a system while actively using it for a PKI-required
task

Which of the following is true of compressed URLs (e.g., TinyURL, goo.gl)? - ANSWER
-They may be used to mask malicious intent

What is a best practice for creating user accounts for your home computer? - ANSWER
-Create separate accounts for each user and have each user create their own
password.

Which of the following is a best practice to protect your identity? - ANSWER -Ask how
information will be used before giving it out. (Correct)

Ref: Cyber Awareness Challenge 2025 / Identity Protection

John receives an e-mail about a potential shutdown of a major social service unless a
petition receives enough signatures. Which of the following actions should John NOT
take with the e-mail? - ANSWER -Forward it (Correct)

Ref: Cyber Awareness Challenge 2025 / Phishing

Which of the following is an appropriate use of government e-mail? - ANSWER -Using a
digital signature when sending hyperlinks

Steve occasionally runs errands during virtual meetings. He joins the meetings using his
approved government device. Does this pose a security concern? - ANSWER -Yes.
Eavesdroppers may be listening to Steve's conversation

Geschreven voor

Instelling
DOD Cyber Awareness
Vak
DOD Cyber Awareness

Documentinformatie

Geüpload op
18 januari 2026
Aantal pagina's
6
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Onbekend

Onderwerpen

$16.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
biggdreamer Havard School
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
282
Lid sinds
2 jaar
Aantal volgers
67
Documenten
18355
Laatst verkocht
4 dagen geleden

4.0

45 beoordelingen

5
25
4
7
3
7
2
2
1
4

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen