US NAVY CYBER AWARENESS CHALLENGE
2025 | COMPREHENSIVE Q&A FOR
GUARANTEED PASS
Under which Cyberspace Protection Condition (CPCON) is the priority focus
limited to critical functions?
-CPCON 1
-CPCON 2
-CPCON 3
-CPCON 4 - correct-answer-CPCON 1
Which of the following uses of removable media is allowed?
-Alex uses personally owned removable media on an Unclassified government
laptop to transfer personal music files.
-Nicky uses Unclassified government owned removable media to transfer work
files to a personal laptop.
-Cameron connects a personal phone to an Unclassified government laptop to
charge.
-Sam uses approved Government owned removable media to transfer files
between government systems as authorized. - correct-answer-Sam uses
,2|Page
approved Government owned removable media to transfer files between
government systems as authorized.
John receives an e-mail about a potential shutdown of a major social service
unless a petition receives enough signatures. Which of the following actions
should John NOT take with the e-mail?
-Research the claim
-Delete it
-Forward it
-Mark it as junk - correct-answer-Forward it
Which of the following is a best practice for using government e-mail?
-Do not solicit sales
-Use "Reply All" when responding to e-mails
-Copy your personal e-mail on your outgoing-emails
-Do not use a digital signature when sending attachments - correct-answer-Do
not solicit sales
When is the safest time to post on social media about your work-related travel?
,3|Page
-During the trip
-Before the trip
-After the trip - correct-answer-After the trip
As you browse a social media site, you come across photos of information with
classification markings. What should you do?
-You are authorized to response to inquiries about it.
-Notify your security point of contact.
-You may forward the URL to the information to interested parties.
-Download the information to your computer. - correct-answer-Notify your
security point of contact.
Matt is a government employee who needs to share a document containing
source selection data with his supervisor. Which of the following describes the
most appropriate way for Matt to do this?
-Sent it via chat in a collaboration app.
-Leave a printed copy on his supervisor's desk after working hours.
-Encrypt it and send it via digitally signed Government e-mail.
-Save it to a shared folder accessible to their team. - correct-answer-Encrypt it
and send it via digitally signed Government e-mail.
, 4|Page
Which of the following is best practice when browsing the Internet?
-Set your browser to accept all cookies
-Look for the h-t-t-p-s in the URL name
-Confirm that the site uses an unencrypted link
-Save your credit card information on e-commerce sites - correct-answer-Look for
the h-t-t-p-s in the URL name
Based on the description provided, how many insider threat indicators are
present?
Edward has worked for a DoD agency for 2 years. He is an analyst who takes a
great deal of interest in his work. He occasionally takes a somewhat aggressive
interest in others' work as well, including asking for classified detail of their
projects. He otherwise gets along well with his colleagues.
-0
-1
-2
-3+ - correct-answer-1