DOD Cyber Awareness Challenge 2026 Knowledge check
|| || || || || || ||
questions with accurate detailed solutions || || || ||
Which of the following is true of compressed URLs (e.g., TinyURL, goo.gl)? - ✔✔They may be
|| || || || || || || || || || || || || || || ||
used to mask malicious intent
|| || || ||
What is a best practice for creating user accounts for your home computer? - ✔✔Create separate
|| || || || || || || || || || || || || || || ||
accounts for each user and have each user create their own password.
|| || || || || || || || || || ||
Which of the following is a best practice to protect your identity? - ✔✔Ask how information will
|| || || || || || || || || || || || || || || || ||
be used before giving it out. (Correct)
|| || || || || ||
Ref: Cyber Awareness Challenge 2025 / Identity Protection
|| || || || || || ||
John receives an e-mail about a potential shutdown of a major social service unless a petition
|| || || || || || || || || || || || || || || ||
receives enough signatures. Which of the following actions should John NOT take with the e-
|| || || || || || || || || || || || || ||
mail? - ✔✔Forward it (Correct)
|| || || ||
Ref: Cyber Awareness Challenge 2025 / Phishing
|| || || || || ||
Which of the following is an appropriate use of government e-mail? - ✔✔Using a digital
|| || || || || || || || || || || || || || ||
signature when sending hyperlinks || || ||
Steve occasionally runs errands during virtual meetings. He joins the meetings using his approved
|| || || || || || || || || || || || ||
government device. Does this pose a security concern? - ✔✔Yes. Eavesdroppers may be listening
|| || || || || || || || || || || || || ||
to Steve's conversation
|| || ||
How can you prevent viruses and malicious code? - ✔✔Scan all e-mail attachments (Correct)
|| || || || || || || || || || || || ||
Ref: Cyber Awareness Challenge 2025 / Protecting Against Malicious Code
|| || || || || || || || ||
, 2
Matt is a government employee who needs to share a document containing source selection data
|| || || || || || || || || || || || || || ||
with his supervisor. Which of the following describes the most appropriate way for Matt to do
|| || || || || || || || || || || || || || || ||
this? - ✔✔Encrypt it and send it via digitally signed Government e-mail. (Correct)
|| || || || || || || || || || || ||
Ref: Cyber Awareness Challenge 2025 / Protecting PII/PHI
|| || || || || || ||
You receive an e-mail with a link to run an anti-virus scan. Your IT department has not sent links
|| || || || || || || || || || || || || || || || || || ||
like this in the past. The e-mail is not digitally signed. What action should you take? - ✔✔Report
|| || || || || || || || || || || || || || || || || ||
the e-mail to your security POC or help desk. (Correct)
|| || || || || || || || ||
Ref: Cyber Awareness Challenge 2025 / Phishing
|| || || || || ||
Which of the following is a way to protect classified data? - ✔✔Store it in a GSA-approved
|| || || || || || || || || || || || || || || || ||
container
How can you protect yourself from identity theft? - ✔✔Review your credit report annually
|| || || || || || || || || || || || ||
How can you protect your home computer? - ✔✔Use legitimate, known antivirus software
|| || || || || || || || || || || || ||
(Correct)
Install spyware protection software. (Correct)
|| || || ||
Ref: Cyber Awareness Challenge 2025 / Best Practices for Home Computer Security
|| || || || || || || || || || ||
Which of the following poses a security risk while teleworking in an environment where Internet
|| || || || || || || || || || || || || || ||
of Things (IoT) devices are present? - ✔✔All of these.
|| || || || || || || || ||
Which of these is NOT a potential indicator that your device may be under a malicious code
|| || || || || || || || || || || || || || || || ||
attack? - ✔✔An operating system update (Correct)
|| || || || || ||