US NAVY CYBER AWARENESS CHALLENGE 2025 QUESTIONS
WITH CORRECT ANSWERS
1) How can you protect data on a mobile device?
- Use two- factor authentication
- Store your data on a commercial cloud application
- Disable automatic screen locking after a period of inactivity
- Turn over your device as requested by authority figures -- Correct Answer
✔✔ Use two- factor authentication
2) Which of the following is true of compressed URLs (e.g., Tiny URL, goo.gl)?
- You must open the link to find out where it leads.
- You can hover your cursor over it to preview where it actually leads.
- They pose no risk.
- They may be used to mask malicious intent -- Correct Answer ✔✔ They may
be used to mask malicious intent
3) Which type of data could reasonably be expected to cause damage to national
security?
- Secret
- Confidential
- Controlled Unclassified Information (CUI)
- Top Secret -- Correct Answer ✔✔ Confidential
4) Which of the following is a best practice for physical security?
- Only hold the door for coworkers that you know work in the facility
- Post access rosters in a visible area outside the facility
- Lock your security badges away and avoid wearing it while in the facility
, - Report suspicious activity -- Correct Answer ✔✔ Report suspicious activity
5) Which of the following statement is true of DoD Unclassified data?
- It does not require access or distribution controls.
- It must be cleared before being released to the public.
- It poses no risk to the safety of government personnel, mission, or systems.
- It does not require classification markings. -- Correct Answer ✔✔ It must be
cleared before being released to the public.
6) How can you protect a mobile device while traveling?
- Only use public Wi- Fi offered by established businesses
- Only make voice calls, as they are more secure than data transmissions
- Connect with a Government VPN
- Store the device in a hotel safe when sightseeing -- Correct Answer ✔✔
Connect with a Government VPN
7) How can you protect your home computer?
- Turn off antivirus software scans
- Install spyware protection software
- Disable firewall protection
- Accept all mobile code -- Correct Answer ✔✔ Install spyware protection
software
8) How can you protect your home computer?
- Use the administration account for all users
- Disable the password feature
- Decline security updates
- Use legitimate, known antivirus software -- Correct Answer ✔✔ Use
legitimate, known antivirus software
9) Which of the following is true of spillage?
, - It occurs when authorization to transfer information is granted and then later
revoked.
- It describes information that is "spilled" to either a lower or higher protection
level.
- It refers specifically to classified information that becomes publicly available.
- It can be either inadvertent or intentional. -- Correct Answer ✔✔ It can be
either inadvertent or intentional.
10) Which of the following personally owned peripherals can you use with government
furnished equipment (GFE)?
- A wired keyboard connected via USB
- A wired webcam that requires installed drivers
- A Bluetooth headset
- A monitor connected via USB -- Correct Answer ✔✔ A wired keyboard
connected via USB
11) How can you protect yourself from identity theft?
- Share passwords and PINs in your household
- Review your credit report annually
- Scan personal documents before discarding them
- Segregate the data collected by your apps and devices -- Correct Answer ✔✔
Review your credit report annually
12) Which of the following is a way to protect classified data?
- Remove classification markings when transporting it
- Store it in a GSA- approved container
- Use a classified network for unclassified work
- Destroy inappropriately marked material -- Correct Answer ✔✔ Store it in a
GSA- approved container
13) What are the requirements for access to Sensitive Compartmented Information
(SCI)?
WITH CORRECT ANSWERS
1) How can you protect data on a mobile device?
- Use two- factor authentication
- Store your data on a commercial cloud application
- Disable automatic screen locking after a period of inactivity
- Turn over your device as requested by authority figures -- Correct Answer
✔✔ Use two- factor authentication
2) Which of the following is true of compressed URLs (e.g., Tiny URL, goo.gl)?
- You must open the link to find out where it leads.
- You can hover your cursor over it to preview where it actually leads.
- They pose no risk.
- They may be used to mask malicious intent -- Correct Answer ✔✔ They may
be used to mask malicious intent
3) Which type of data could reasonably be expected to cause damage to national
security?
- Secret
- Confidential
- Controlled Unclassified Information (CUI)
- Top Secret -- Correct Answer ✔✔ Confidential
4) Which of the following is a best practice for physical security?
- Only hold the door for coworkers that you know work in the facility
- Post access rosters in a visible area outside the facility
- Lock your security badges away and avoid wearing it while in the facility
, - Report suspicious activity -- Correct Answer ✔✔ Report suspicious activity
5) Which of the following statement is true of DoD Unclassified data?
- It does not require access or distribution controls.
- It must be cleared before being released to the public.
- It poses no risk to the safety of government personnel, mission, or systems.
- It does not require classification markings. -- Correct Answer ✔✔ It must be
cleared before being released to the public.
6) How can you protect a mobile device while traveling?
- Only use public Wi- Fi offered by established businesses
- Only make voice calls, as they are more secure than data transmissions
- Connect with a Government VPN
- Store the device in a hotel safe when sightseeing -- Correct Answer ✔✔
Connect with a Government VPN
7) How can you protect your home computer?
- Turn off antivirus software scans
- Install spyware protection software
- Disable firewall protection
- Accept all mobile code -- Correct Answer ✔✔ Install spyware protection
software
8) How can you protect your home computer?
- Use the administration account for all users
- Disable the password feature
- Decline security updates
- Use legitimate, known antivirus software -- Correct Answer ✔✔ Use
legitimate, known antivirus software
9) Which of the following is true of spillage?
, - It occurs when authorization to transfer information is granted and then later
revoked.
- It describes information that is "spilled" to either a lower or higher protection
level.
- It refers specifically to classified information that becomes publicly available.
- It can be either inadvertent or intentional. -- Correct Answer ✔✔ It can be
either inadvertent or intentional.
10) Which of the following personally owned peripherals can you use with government
furnished equipment (GFE)?
- A wired keyboard connected via USB
- A wired webcam that requires installed drivers
- A Bluetooth headset
- A monitor connected via USB -- Correct Answer ✔✔ A wired keyboard
connected via USB
11) How can you protect yourself from identity theft?
- Share passwords and PINs in your household
- Review your credit report annually
- Scan personal documents before discarding them
- Segregate the data collected by your apps and devices -- Correct Answer ✔✔
Review your credit report annually
12) Which of the following is a way to protect classified data?
- Remove classification markings when transporting it
- Store it in a GSA- approved container
- Use a classified network for unclassified work
- Destroy inappropriately marked material -- Correct Answer ✔✔ Store it in a
GSA- approved container
13) What are the requirements for access to Sensitive Compartmented Information
(SCI)?