DOD Cyber Awareness Challenge 2025 Knowledge check
|| || || || || || ||
questions with accurate detailed solutions || || || ||
Which of the following is true of compressed URLs (e.g., TinyURL, goo.gl)?
|| || || || || || || || || || ||
They may be used to mask malicious intent. (Correct)
|| || || || || || || ||
Ref: Cyber Awareness Challenge 2025 / Compressed URLs
|| || || || || || ||
What is a best practice for creating user accounts for your home computer?
|| || || || || || || || || || || ||
Create separate accounts for each user and have each user create their own password. (Correct)
|| || || || || || || || || || || || || ||
Ref: Cyber Awareness Challenge 2025 / Best Practices for Home Computer Security
|| || || || || || || || || || ||
Which of the following is a best practice to protect your identity?
|| || || || || || || || || || ||
Ask how information will be used before giving it out. (Correct)
|| || || || || || || || || ||
Ref: Cyber Awareness Challenge 2025 / Identity Protection
|| || || || || || ||
John receives an e-mail about a potential shutdown of a major social service unless a petition
|| || || || || || || || || || || || || || || ||
receives enough signatures. Which of the following actions should John NOT take with the e-
|| || || || || || || || || || || || || ||
mail?
Forward it (Correct) || ||
Ref: Cyber Awareness Challenge 2025 / Phishing
|| || || || || ||
Which of the following is an appropriate use of government e-mail?
|| || || || || || || || || ||
Using a digital signature when sending hyperlinks (Correct)
|| || || || || || ||
Ref: Cyber Awareness Challenge 2025 / Use of Government E-mail
|| || || || || || || || ||
Steve occasionally runs errands during virtual meetings. He joins the meetings using his approved
|| || || || || || || || || || || || ||
government device. Does this pose a security concern?
|| || || || || || || ||
Yes. Eavesdroppers may be listening to Steve's conversation (Correct)
|| || || || || || || ||
Ref: Common Sense
|| ||
How can you prevent viruses and malicious code?
|| || || || || || ||
, 2
Scan all e-mail attachments (Correct)
|| || || ||
Ref: Cyber Awareness Challenge 2025 / Protecting Against Malicious Code
|| || || || || || || || ||
Matt is a government employee who needs to share a document containing source selection data
|| || || || || || || || || || || || || || ||
with his supervisor. Which of the following describes the most appropriate way for Matt to do
|| || || || || || || || || || || || || || || ||
this?
Encrypt it and send it via digitally signed Government e-mail. (Correct)
|| || || || || || || || || ||
Ref: Cyber Awareness Challenge 2025 / Protecting PII/PHI
|| || || || || || ||
You receive an e-mail with a link to run an anti-virus scan. Your IT department has not sent links
|| || || || || || || || || || || || || || || || || || ||
like this in the past. The e-mail is not digitally signed. What action should you take?
|| || || || || || || || || || || || || || ||
Report the e-mail to your security POC or help desk. (Correct)
|| || || || || || || || || ||
Ref: Cyber Awareness Challenge 2025 / Phishing
|| || || || || ||
Which of the following is a way to protect classified data?
|| || || || || || || || || ||
Store it in a GSA-approved container. (Correct)
|| || || || || ||
Ref: Cyber Awareness Challenge 2025 / Protecting Classified Data
|| || || || || || || ||
How can you protect yourself from identity theft?
|| || || || || || ||
Review your credit report annually. (Correct) || || || || ||
Ref: Cyber Awareness Challenge 2025 / Identity Protection
|| || || || || || ||
How can you protect your home computer?
|| || || || || ||
Use legitimate, known antivirus software (Correct)
|| || || || ||
Install spyware protection software. (Correct)
|| || || ||
Ref: Cyber Awareness Challenge 2025 / Best Practices for Home Computer Security
|| || || || || || || || || || ||
Which of the following poses a security risk while teleworking in an environment where Internet
|| || || || || || || || || || || || || || ||
of Things (IoT) devices are present?
|| || || || ||
All of these. (Correct)
|| || ||
Ref: Cyber Awareness Challenge 2025 / Internet of Things (IoT)
|| || || || || || || || ||
Which of these is NOT a potential indicator that your device may be under a malicious code
|| || || || || || || || || || || || || || || || ||
attack?