US NAVY CYBER AWARENESS
CHALLENGE QUESTIONS AND ANSWERS
2025
Which of the following is an example of behavior that you
should report?
-Planning an overseas vacation
-Drinking alcohol socially
-Expressing dislike of a recent Presidential action
-Bringing a phone into a prohibited area - correct answer-
Bringing a phone into a prohibited area
You receive an e-mail with a link to run an anti-virus scan. Your
IT department has not sent links like this in the past. The e-mail
is not digitally signed. What action should you take?
-Select the link to run the anti-virus scan.
-Look for a phone number in the e-mail to call for more
information.
-Report the e-mail to your security POC or help desk.
-Reply to the e-mail to request more information. - correct
answer- Report the e-mail to your security POC or help desk.
,2 | Page
Which of the following is an example of a strong password?
-bRobr@79I*P
-Fluffy&Spot
-Password12345
-1965May31! - correct answer- bRobr@79I*P
Which of the following can be used to catalogue information
about you?
-Social networking sites
-Audio-enabled digital assistants (e.g., Siri, Alexa)
-Fitness trackers
-All of these - correct answer- All of these
Which of the following is a best practice to protect your identity?
-Throw credit card and bank statement in the trash
-Carry your passport with you at all times
-Enable data aggregation on sites when possible
-Ask how information will be used before giving it out - correct
answer- Ask how information will be used before giving it out
,3 | Page
Which of the following describes Sensitive Compartmented
Information (SCI)?
-The requirement for access to SCI material are security
clearance eligibility and need-to-know
-SCI introduces an overlay of security to Top Secret, Secret,
and Confidential information.
-The determination that a piece of information is SCI is made at
the organizational level.
-SCI is a type of Controlled Unclassified Information (CUI). -
correct answer- SCI introduces an overlay of security to Top
Secret, Secret, and Confidential information.
Which of the following is the safest to share on a social media
networking site?
-Your birthdate
-Your mother's maiden name
-Your favorite movie
-Your current location - correct answer- Your favorite movie
You receive a text message from a vendor notifying you that
your order is on hold due to needing updated payment
information from you. It provides a shortened link for you to
, 4 | Page
provide the needed information. What is the best course of
action?
-Open the link to provide information
-Reply to the message and ask for more information
-Delete the message
-Open the link to inspect the website - correct answer- Delete
the message
Which of these is NOT a potential indicator that your device
may be under a malicious code attack?
-The device slows down
-Loss of control of the mouse or keyboard
-A strange pop-up during system startup
-An operating system update - correct answer- An operating
system update
What is a best practice for creating user accounts for your
home computer?
-Do not share your home computer with any other user
-Create separate accounts for each user and tailor each
password wo what will be easy for the individual user to
remember