SOLUTIONS
Which of the following is true of compressed URLs (e.g., TinyURL, goo.gl)? - (answer)They may be used
to mask malicious intent
What is a best practice for creating user accounts for your home computer? - (answer)Create separate
accounts for each user and have each user create their own password.
Which of the following is a best practice to protect your identity? - (answer)Ask how information will be
used before giving it out. (Correct)
Ref: Cyber Awareness Challenge 2025 / Identity Protection
John receives an e-mail about a potential shutdown of a major social service unless a petition receives
enough signatures. Which of the following actions should John NOT take with the e-mail? -
(answer)Forward it (Correct)
Ref: Cyber Awareness Challenge 2025 / Phishing
Which of the following is an appropriate use of government e-mail? - (answer)Using a digital signature
when sending hyperlinks
Steve occasionally runs errands during virtual meetings. He joins the meetings using his approved
government device. Does this pose a security concern? - (answer)Yes. Eavesdroppers may be listening to
Steve's conversation
How can you prevent viruses and malicious code? - (answer)Scan all e-mail attachments (Correct)
Ref: Cyber Awareness Challenge 2025 / Protecting Against Malicious Code
Matt is a government employee who needs to share a document containing source selection data with
his supervisor. Which of the following describes the most appropriate way for Matt to do this? -
(answer)Encrypt it and send it via digitally signed Government e-mail. (Correct)
, DOD CYBER AWARENESS KNOWLEDGE CHECK QUIZ QUESTIONS WITH COMPLETE
SOLUTIONS
Ref: Cyber Awareness Challenge 2025 / Protecting PII/PHI
You receive an e-mail with a link to run an anti-virus scan. Your IT department has not sent links like this
in the past. The e-mail is not digitally signed. What action should you take? - (answer)Report the e-mail
to your security POC or help desk. (Correct)
Ref: Cyber Awareness Challenge 2025 / Phishing
Which of the following is a way to protect classified data? - (answer)Store it in a GSA-approved
container
How can you protect yourself from identity theft? - (answer)Review your credit report annually
How can you protect your home computer? - (answer)Use legitimate, known antivirus software
(Correct)
Install spyware protection software. (Correct)
Ref: Cyber Awareness Challenge 2025 / Best Practices for Home Computer Security
Which of the following poses a security risk while teleworking in an environment where Internet of
Things (IoT) devices are present? - (answer)All of these.
Which of these is NOT a potential indicator that your device may be under a malicious code attack? -
(answer)An operating system update (Correct)
Ref: Cyber Awareness Challenge 2025 / Incident Indicators
What are the requirements for access to Sensitive Compartmented Information (SCI)? - (answer)Top
Secret clearance and indoctrination into the SCI program