Annual DoD Cyber Awareness Challenge Exam 2026 || || || || || || ||
with precise detailed solutions || || ||
How does an insider threat harm national security? - ✔✔Exploiting their trusted status and
|| || || || || || || || || || || || || ||
authorized access to government resources || || || ||
Martha supervises a government unit. To improve morale, she frequently e-mails inspirational
|| || || || || || || || || || || ||
stories and photos with inspirational quotes on them to her team. Is this an appropriate use of
|| || || || || || || || || || || || || || || || ||
government email? - ✔✔No. These e-mails generate unnecessary e-mail traffic. || || || || || || || || ||
Consider this social media post. Are there any security concerns in it? "I'm hosting a family
|| || || || || || || || || || || || || || || ||
reunion for my mom's side of the family, the Smiths. Come by my place at 1234 Mockingbird
|| || || || || || || || || || || || || || || || ||
Lane on the 8th...and grab a slice of birthday cake for me while you're there!" - ✔✔Yes. It
|| || || || || || || || || || || || || || || || || ||
contains several items of personally identifiable information (PII), including the mother's maiden
|| || || || || || || || || || || ||
name, home address, and birthday.
|| || || ||
Oliver uses his phone to look up information about a jacket he might want to purchase. Later, he
|| || || || || || || || || || || || || || || || || ||
notices ads for the jacket appearing on websites that he views using his laptop. Why would he see
|| || || || || || || || || || || || || || || || || ||
this happen? - ✔✔Oliver's apps and devices collect and share information about him.
|| || || || || || || || || || || ||
which of the following is an example of a correct way to protect classified data? - ✔✔Andrea
|| || || || || || || || || || || || || || || || ||
verifies need-to-know and security eligibility before sharing classified information.
|| || || || || || || ||
Which of the following is an example of an individual's activity that you should report? -
|| || || || || || || || || || || || || || || ||
✔✔Changing workplace behavior abruptly || || ||
What is a Security Classification Guide? - ✔✔A primary source for derivative classification
|| || || || || || || || || || || ||
Paula is compiling statistics on healthcare provided to Service members over the last fiscal year.
|| || || || || || || || || || || || || || ||
Some of her source data includes Protected Health Information (PHI). How can she properly
|| || || || || || || || || || || || || ||