Department of Defense (DoD) Cyber Awareness Challenge 2025 (1 hr)

DoD Cyber Awareness Challenge 2025

  1. Question: Which of the following is true of removable media and portable electronic devices (PEDs)? Answer: The risks associated with them may lead to loss of life.

  2. Question: John receives an e-mail about a potential shutdown of a major social service unless a petition receives enough signatures... Which of the following actions should John NOT take with the e-mail? Answer: Forward it

  3. Question: Which of the following is a way to protect classified data? Answer: Store it in a GSA-approved container

  4. Question: How can you protect a mobile device while traveling? Answer: Connect with a Government VPN

  5. Question: Which of the following would work in combination for two-factor authentication? Answer: Common Access Card (CAC) and Personal Identification Number (PIN)

  6. Question: Which of the following is the safest to share on a social networking site? Answer: Your favorite movie

  7. Question: Which of the following is an example of a strong password? Answer: bRobr791*P

  8. Question: Which of the following is a best practice for protecting your home wireless network for telework or remote work? Answer: Implement, as a minimum, Wi-Fi Protected Access 2 (WPA2) Personal encryption

  9. Question: Which of the following can be used to catalogue information about you? Answer: All of these (social networking sites, Audio-enabled digital assistants, Fitness trackers)

  10. Question: You receive an e-mail marked important from your agency head asking you to call them using a number you do not recognize... What action should you take? Answer: This may be a spear phishing attempt. Report it to your security POC or help desk.

  11. Question: What is a best practice for creating user accounts for your home computer? Answer: Create separate accounts for each user and have each user create their own password.

  12. Question: Which of the following is an allowed use of government-furnished equipment (GFE)? Answer: E-mailing your supervisor

  13. Question: Which of the following is permitted within a Sensitive Compartmented Information Facility (SCIF)? Answer: An authorized Government-owned Portable Electronic Device (PED)

  14. Question: Which of the following statements about Protected Health Information (PHI) is true? Answer: It is health information that identifies the individual.

  15. Question: How can you protect your home computer? Answer: Use legitimate, known antivirus software

  16. Question: Which of the following is true of transmitting or transporting Sensitive Compartmented Information (SCI)? Answer: You must be courier-briefed for SCI to transport it.

  17. Question: How can you prevent viruses and malicious code? Answer: Scan all email attachments

  18. Question: Which of the following is NOT an appropriate use of your Common Access Card (CAC)? Answer: Exchanging it for a visitor pass in another building

  19. Question: Which of the following is true of spillage? Answer: It can be either inadvertent or intentional.

  20. Question: When linked to a specific individual, which of the following is NOT an example of Personally Identifiable Information (PII)? Answer: Smartphone brand and model

  21. Question: You receive a text message from a vendor notifying you that your order is on hold due to needing updated payment information... What is the best course of action? Answer: Delete the message

  22. Question: Which of these is NOT a potential indicator that your device may be under a malicious code attack? Answer: An operating system update

  23. Question: Who designates whether information is classified and its classification level? Answer: Original classification authority

  24. Question: How can you protect data on a mobile device? Answer: Use two-factor authentication

  25. Question: Which of the following is a potential insider threat indicator? Answer: Death of a spouse