DOD Cyber Awareness Challenge 2025 Knowledge check
Study online at https://quizlet.com/_fv066n
1. Which of the following is true of compressed They may be used to mask malicious in-
URLs (e.g., TinyURL, goo.gl)? tent. (Correct)
Ref: Cyber Awareness Challenge 2025 /
Compressed URLs
2. What is a best practice for creating user ac- Create separate accounts for each user
counts for your home computer? and have each user create their own pass-
word. (Correct)
Ref: Cyber Awareness Challenge 2025 /
Best Practices for Home Computer Secu-
rity
3. Which of the following is a best practice to Ask how information will be used before
protect your identity? giving it out. (Correct)
Ref: Cyber Awareness Challenge 2025 /
Identity Protection
4. John receives an e-mail about a potential Forward it (Correct)
shutdown of a major social service unless a
petition receives enough signatures. Which Ref: Cyber Awareness Challenge 2025 /
of the following actions should John NOT Phishing
take with the e-mail?
5. Which of the following is an appropriate use Using a digital signature when sending
of government e-mail? hyperlinks (Correct)
Ref: Cyber Awareness Challenge 2025 /
Use of Government E-mail
6.
, DOD Cyber Awareness Challenge 2025 Knowledge check
Study online at https://quizlet.com/_fv066n
Steve occasionally runs errands during vir- Yes. Eavesdroppers may be listening to
tual meetings. He joins the meetings using Steve's conversation (Correct)
his approved government device. Does this
pose a security concern? Ref: Common Sense
7. How can you prevent viruses and malicious Scan all e-mail attachments (Correct)
code?
Ref: Cyber Awareness Challenge 2025 /
Protecting Against Malicious Code
8. Matt is a government employee who needs Encrypt it and send it via digitally signed
to share a document containing source se- Government e-mail. (Correct)
lection data with his supervisor. Which of
the following describes the most appropri- Ref: Cyber Awareness Challenge 2025 /
ate way for Matt to do this? Protecting PII/PHI
9. You receive an e-mail with a link to run an Report the e-mail to your security POC or
anti-virus scan. Your IT department has not help desk. (Correct)
sent links like this in the past. The e-mail is
not digitally signed. What action should you Ref: Cyber Awareness Challenge 2025 /
take? Phishing
10. Which of the following is a way to protect Store it in a GSA-approved container. (Cor-
classified data? rect)
Ref: Cyber Awareness Challenge 2025 /
Protecting Classified Data
11. How can you protect yourself from identity Review your credit report annually. (Cor-
theft? rect)
Ref: Cyber Awareness Challenge 2025 /
Identity Protection
Study online at https://quizlet.com/_fv066n
1. Which of the following is true of compressed They may be used to mask malicious in-
URLs (e.g., TinyURL, goo.gl)? tent. (Correct)
Ref: Cyber Awareness Challenge 2025 /
Compressed URLs
2. What is a best practice for creating user ac- Create separate accounts for each user
counts for your home computer? and have each user create their own pass-
word. (Correct)
Ref: Cyber Awareness Challenge 2025 /
Best Practices for Home Computer Secu-
rity
3. Which of the following is a best practice to Ask how information will be used before
protect your identity? giving it out. (Correct)
Ref: Cyber Awareness Challenge 2025 /
Identity Protection
4. John receives an e-mail about a potential Forward it (Correct)
shutdown of a major social service unless a
petition receives enough signatures. Which Ref: Cyber Awareness Challenge 2025 /
of the following actions should John NOT Phishing
take with the e-mail?
5. Which of the following is an appropriate use Using a digital signature when sending
of government e-mail? hyperlinks (Correct)
Ref: Cyber Awareness Challenge 2025 /
Use of Government E-mail
6.
, DOD Cyber Awareness Challenge 2025 Knowledge check
Study online at https://quizlet.com/_fv066n
Steve occasionally runs errands during vir- Yes. Eavesdroppers may be listening to
tual meetings. He joins the meetings using Steve's conversation (Correct)
his approved government device. Does this
pose a security concern? Ref: Common Sense
7. How can you prevent viruses and malicious Scan all e-mail attachments (Correct)
code?
Ref: Cyber Awareness Challenge 2025 /
Protecting Against Malicious Code
8. Matt is a government employee who needs Encrypt it and send it via digitally signed
to share a document containing source se- Government e-mail. (Correct)
lection data with his supervisor. Which of
the following describes the most appropri- Ref: Cyber Awareness Challenge 2025 /
ate way for Matt to do this? Protecting PII/PHI
9. You receive an e-mail with a link to run an Report the e-mail to your security POC or
anti-virus scan. Your IT department has not help desk. (Correct)
sent links like this in the past. The e-mail is
not digitally signed. What action should you Ref: Cyber Awareness Challenge 2025 /
take? Phishing
10. Which of the following is a way to protect Store it in a GSA-approved container. (Cor-
classified data? rect)
Ref: Cyber Awareness Challenge 2025 /
Protecting Classified Data
11. How can you protect yourself from identity Review your credit report annually. (Cor-
theft? rect)
Ref: Cyber Awareness Challenge 2025 /
Identity Protection