How can you protect data on a mobile device?
Give this one a try later!
Use two-factor authentication (Correct)
Ref: Cyber Awareness Challenge 2025 / Protecting Data on Mobile Devices
and PEDs
,Based on the description provided, how many insider threat indicators are present?
Edward has worked for the DoD agency for 2 years. He is an analyst who takes a great
deal of interest in his work. He occasionally takes a somewhat aggressive interest in
others' work as well, including asking for classified details of their projects. He
otherwise gets along well with his colleagues.
Give this one a try later!
1 (Correct)
Ref: Cyber Awareness Challenge 2025 / Detecting Insider Threats
You receive a text message from a vendor notifying you that your order is on hold
due to needing updated payment information from you. It provides a shortened link
for you to provide the needed information. What is the best course of action?
Give this one a try later!
Delete the message (Correct)
Ref: Cyber Awareness Challenge 2025 / Smishing
Does it pose a risk to tap your smartwatch to pay for a purchase at a store?
Give this one a try later!
, Yes, there is a risk that the signal could be intercepted and altered.
(Correct)
Ref: Cyber Awareness Challenge 2025 / Near Field Communication (NFC)
Which type of data could reasonably be expected to cause damage to national
security?
Give this one a try later!
Confidential (Correct)
Ref: Cyber Awareness Challenge 2025 / Classified Data
Which of the following is a best practice for using government e-mail?
Give this one a try later!
Do not solicit sales. (Correct)
Ref: Cyber Awareness Challenge 2025 / Use of Government E-mail
Which of the following is the safest to share on a social networking site?
Give this one a try later!
Give this one a try later!
Use two-factor authentication (Correct)
Ref: Cyber Awareness Challenge 2025 / Protecting Data on Mobile Devices
and PEDs
,Based on the description provided, how many insider threat indicators are present?
Edward has worked for the DoD agency for 2 years. He is an analyst who takes a great
deal of interest in his work. He occasionally takes a somewhat aggressive interest in
others' work as well, including asking for classified details of their projects. He
otherwise gets along well with his colleagues.
Give this one a try later!
1 (Correct)
Ref: Cyber Awareness Challenge 2025 / Detecting Insider Threats
You receive a text message from a vendor notifying you that your order is on hold
due to needing updated payment information from you. It provides a shortened link
for you to provide the needed information. What is the best course of action?
Give this one a try later!
Delete the message (Correct)
Ref: Cyber Awareness Challenge 2025 / Smishing
Does it pose a risk to tap your smartwatch to pay for a purchase at a store?
Give this one a try later!
, Yes, there is a risk that the signal could be intercepted and altered.
(Correct)
Ref: Cyber Awareness Challenge 2025 / Near Field Communication (NFC)
Which type of data could reasonably be expected to cause damage to national
security?
Give this one a try later!
Confidential (Correct)
Ref: Cyber Awareness Challenge 2025 / Classified Data
Which of the following is a best practice for using government e-mail?
Give this one a try later!
Do not solicit sales. (Correct)
Ref: Cyber Awareness Challenge 2025 / Use of Government E-mail
Which of the following is the safest to share on a social networking site?
Give this one a try later!