PM
"US Navy Cyber Awareness Challenge 2025: Data
Protection & Security"
1. Describe the role of two-factor authentication in securing online accounts as
mentioned in the text.
Two-factor authentication is only used for financial transactions.
Two-factor authentication only requires a password to access
accounts.
Two-factor authentication is not necessary for mobile devices.
Two-factor authentication adds an extra layer of security by
requiring a second form of verification, such as a text message
code, in addition to a password.
2. Why is it important to use a GSA-approved container for classified
data storage?
It is a requirement for all electronic devices.
It allows for easier access to the data.
A GSA-approved container provides a secure environment
for protecting classified information.
It helps in the transportation of unclassified information.
3. What is one method mentioned for storing classified data securely?
Use a classified network for unclassified work
Remove classification markings when transporting it
Store it in a GSA-approved container
Destroy inappropriately marked material
1/54
,2/24/25, 6:02 Data Protection and Security
PM
4. Select the statement that is true about preventing identity theft.
Check your monthly statements twice a year for suspicious charges.
Check your credit report at least once a year for suspicious activity.
Check your credit report at least twice a year for suspicious activity.
Check your monthly statements once a year for suspicious charges.
5. Why is it important to contact your security point of contact (POC) when
Sensitive Compartmented Information (SCI) is compromised?
To inform colleagues about the incident.
To gather more information about the breach.
To ensure proper protocols are followed for handling the breach.
To assess the impact of the breach on personal data.
6. If a user wants to enhance their security while using a voice-activated
smart device, which practice should they implement?
Enable two-factor authentication
Use the device without any restrictions
Share personal information freely
Disable all security settings
7. What does GFE stand for in the context of government resources?
Government-Furnished Equipment
General Furnished Equipment
Government Funded Equipment
General Federal Equipment
2/54
,2/24/25, 6:02 Data Protection and Security
PM
8. If you discover classified information on a social media platform and fail
to notify your security point of contact, what potential consequences
could arise?
You could be rewarded for your investigative skills.
You could face disciplinary action for mishandling
classified information.
You may be praised for your discretion.
There would be no consequences as it is not a serious issue.
9. What is one of the risks associated with social media mentioned in
the guidelines?
Exposure of sensitive information
Increased battery consumption
Improved data encryption
Limited access to applications
10. What is the first action you should take if you find classified information on
a social media site?
Download the information to your computer.
Notify your security point of contact.
Forward the URL to the information to interested parties.
You are authorized to respond to inquiries about it.
11. If a company implements a policy requiring employees to use only approved
mobile hotspots for work-related tasks, what security benefit does this policy
provide?
It eliminates the need for passwords.
3/54
, 2/24/25, 6:02 Data Protection and Security
PM
It increases the speed of internet connections.
It allows employees to access social media freely.
It minimizes the risk of data breaches from unsecured networks.
12. Why is it important to verify that personnel in a SCIF have a need-to-
know? To ensure everyone can hear the conversation
To comply with fire safety regulations
To prevent unauthorized access to sensitive information
To facilitate open discussions among all personnel
13. Why is sharing your favorite movie considered safer than sharing
your birthdate or mother's maiden name on social media?
Your favorite movie is less sensitive and does not compromise
personal security.
Your favorite movie is more commonly
known. Your favorite movie is often used as a
password. Your favorite movie is a public
interest topic.
14. Which of the following is a good security practice for web browsing?
Browsing sites using links sent in emails without taking steps to assure
the destination is safe
Avoiding updates to web browsers because they might erase your
browsing history and reprogram your desktop
Exercising caution before downloading files or any other
clicking activity at a website
Only browsing sites provided in email links -
4/54