DOD Cyber Awareness Challenge 2026 Exam with || || || || || || ||
precise detailed answers || ||
Oliver uses his phone to look up information about a jacket he might want to purchase. Later, he
|| || || || || || || || || || || || || || || || || ||
notices ads for the jacket appearing on websites that he views using his laptop. Why would he see
|| || || || || || || || || || || || || || || || || ||
this happen? - ✔✔Oilver's apps and devices collect and share information about him
|| || || || || || || || || || || ||
—> Cross-device data sharing explains targeted ads, not device compromise or jacket popularity.
|| || || || || || || || || || || ||
How to prevent spillage? - ✔✔Label all files with appropriate classification markings
|| || || || || || || || || || ||
—> Proper markings reduce accidental disclosure; other options are less effective.
|| || || || || || || || || ||
Which of the following is a best practice for working offsite during official travel? - ✔✔Position
|| || || || || || || || || || || || || || || ||
your monitor so that it is not easily observed by others while in use
|| || || || || || || || || || || || ||
—> Prevents visual disclosure; other options are weaker safeguards.
|| || || || || || || ||
How should you approach a compressed URL, such as Tiny URL? - ✔✔Right-click the link to
|| || || || || || || || || || || || || || || ||
see where the link leads
|| || || ||
—> Verifies destination before opening to avoid malicious redirects.
|| || || || || || || ||
What should you do with your badge within a Sensitive Compartmented
|| || || || || || || || || ||
Information Facility (SCIF)? - ✔✔Keep it in your wallet || || || || || || || ||
—> Securely carry badge to prevent loss/misuse.
|| || || || || ||
, 2
You have been Issued a new Government-owned mobile device. What is a step you
|| || || || || || || || || || || || ||
should take to secure It? - ✔✔Set up a passcode to unlock it
|| || || || || || || || || || || ||
—> Establishes initial security baseline.
|| || || ||
Consider this social media post. Are there any security concerns in it?
|| || || || || || || || || || ||
"I'm hosting a family reunion for my mom's side of the family, the Smiths. Come b my place at
|| || || || || || || || || || || || || || || || || || ||
1234 Mockingbird Lane on the 8th...and grab a slice of birthday cake for me while you're there!" -
|| || || || || || || || || || || || || || || || ||
✔✔Yes, it contains sensitive personal information (PII) and is not appropriate to share publicly
|| || || || || || || || || || || || || ||
—> Protects identifiable data.
|| || ||
Which of the following e-mail practices can help to prevent inadvertently downloading viruses? -
|| || || || || || || || || || || || || ||
✔✔Use the Preview Pane instead of opening e-mails
|| || || || || || ||
—> Reduces risk from malicious attachments/scripts.
|| || || || ||
Which of the following is a best practice for physical security? - ✔✔Hold the door for coworkers
|| || || || || || || || || || || || || || || || ||
you know when entering your facility
|| || || || ||
—> Controlled access with known individuals.
|| || || || ||
How do Insider Threat Programs defend against insider threats? - ✔✔Intervening early to help
|| || || || || || || || || || || || || ||
individuals with issues || ||
—> Proactive mitigation prevents escalation.
|| || || ||
What is a best practice for user accounts on your home computer? - ✔✔Each user should have
|| || || || || || || || || || || || || || || || ||
their own account
|| ||