DOD Cyber Awareness Challenge 2026 questions with
|| || || || || || ||
precise detailed answers || ||
Peter enters an empty conference room and finds a document with a Top Secret coversheet on it.
|| || || || || || || || || || || || || || || || ||
Peter has a Secret clearance. What should Peter do? - ✔✔A. Immediately notify his security POC
|| || || || || || || || || || || || || || || ||
and not handle the file
|| || || ||
B. Verify that the document contains Top Secret information
|| || || || || || || ||
C. Assume the facility has open storage and leave the document for the owner to return for it
|| || || || || || || || || || || || || || || || ||
D. Destroy the document using any means available
|| || || || || || ||
The correct answer is A. Immediately notify his security POC and not handle the file.
|| || || || || || || || || || || || || ||
Which of the following is an example of two-factor authentication? - ✔✔A. Command Access
|| || || || || || || || || || || || || ||
Card (CAC) and security token
|| || || ||
B. Password and fingerprint
|| || ||
C. Fingerprint and face identification (ID)
|| || || || ||
D. Password and Personal Identification Number (PIN)
|| || || || || ||
The correct answer is B. Password and fingerprint.
|| || || || || || ||
Which of the following is an example of Protected Health Information (PHI)? - ✔✔A. An
|| || || || || || || || || || || || || || ||
individual's medical record maintained by a healthcare provider
|| || || || || || ||
B. An individual's purchase history of over-the-counter medications
|| || || || || || ||
C. A medical diagnosis for an individual shared by that person
|| || || || || || || || || ||
D. The location of a first-aid kit at an office.
|| || || || || || || || ||
The correct answer is A. An individual's medical record maintained by a healthcare provider.
|| || || || || || || || || || || || ||
, 2
How should you approach a compressed URL, such as Tiny URL? - ✔✔A. Never open a
|| || || || || || || || || || || || || || || ||
compressed URL ||
B. Right-click the link to see where the link leads
|| || || || || || || || ||
C. Preview where the link leads before opening it
|| || || || || || || ||
D. Open the link to see where it goes
|| || || || || || || ||
The correct answer is C. Preview where the link leads before opening it.
|| || || || || || || || || || || ||
How can you protect your home computer? - ✔✔A. Disable the password feature
|| || || || || || || || || || || ||
B. Authorize automatic installation of mobile code
|| || || || || ||
C. Disable automatic security updates
|| || || ||
D. Turn on spyware protection
|| || || ||
The correct answer is D. Turn on spyware protection.
|| || || || || || || ||
Evelyn is a system administrator at her agency. As part of her duties, she occasionally uses a
|| || || || || || || || || || || || || || || || ||
thumb drive to perform necessary system tasks, as outlined in her agency's procedures. The thumb
|| || || || || || || || || || || || || ||
drive is provided by the Government for this purpose. Is this an appropriate use of removable
|| || || || || || || || || || || || || || || || ||
media? - ✔✔A. No. Removable media are never permitted for use in the DoD.
|| || || || || || || || || || || || ||
B. Maybe. Evelyn should test the Government thumb drive on a non-organizational system before
|| || || || || || || || || || || || ||
connecting it to a Government system.
|| || || || || ||
C. Yes. Only use removable media when operationally necessary, Government-owned, and
|| || || || || || || || || || ||
approved in accordance with policy. || || || ||
D. Yes, and Evelyn may also use personally owned removable media for this purpose.
|| || || || || || || || || || || || ||
The correct answer is: C. Yes. Only use removable media when operationally necessary,
|| || || || || || || || || || || || ||
Government-owned, and approved in accordance with policy. || || || || || ||
How do Insider Threat Programs defend against insider threats? - ✔✔A. Restricting individuals'
|| || || || || || || || || || || || ||
access to government resources
|| || ||