Department of Defense (DoD) Cyber Awareness Challenge 2025 (1 hr)

DoD Cyber Awareness Challenge 2025

  1. Question: Which of the following is true of removable media and portable electronic devices (PEDs)? Answer: The risks associated with them may lead to loss of life.

  2. Question: John receives an e-mail about a potential shutdown of a major social service unless a petition receives enough signatures... Which of the following actions should John NOT take with the e-mail? Answer: Forward it

  3. Question: Which of the following is a way to protect classified data? Answer: Store it in a GSA-approved container

  4. Question: How can you protect a mobile device while traveling? Answer: Connect with a Government VPN

  5. Question: Which of the following would work in combination for two-factor authentication? Answer: Common Access Card (CAC) and Personal Identification Number (PIN)

  6. Question: Which of the following is the safest to share on a social networking site? Answer: Your favorite movie

  7. Question: Which of the following is an example of a strong password? Answer: bRobr791*P

  8. Question: Which of the following is a best practice for protecting your home wireless network for telework or remote work? Answer: Implement, as a minimum, Wi-Fi Protected Access 2 (WPA2) Personal encryption

  9. Question: Which of the following can be used to catalogue information about you? Answer: All of these (social networking sites, Audio-enabled digital assistants, Fitness trackers)

  10. Question: You receive an e-mail marked important from your agency head asking you to call them using a number you do not recognize... What action should you take? Answer: This may be a spear phishing attempt. Report it to your security POC or help desk.

  11. Question: What is a best practice for creating user accounts for your home computer? Answer: Create separate accounts for each user and have each user create their own password.

  12. Question: Which of the following is an allowed use of government-furnished equipment (GFE)? Answer: E-mailing your supervisor

  13. Question: Which of the following is permitted within a Sensitive Compartmented Information Facility (SCIF)? Answer: An authorized Government-owned Portable Electronic Device (PED)

  14. Question: Which of the following statements about Protected Health Information (PHI) is true? Answer: It is health information that identifies the individual.

  15. Question: How can you protect your home computer? Answer: Use legitimate, known antivirus software

  16. Question: Which of the following is true of transmitting or transporting Sensitive Compartmented Information (SCI)? Answer: You must be courier-briefed for SCI to transport it.

  17. Question: How can you prevent viruses and malicious code? Answer: Scan all email attachments

  18. Question: Which of the following is NOT an appropriate use of your Common Access Card (CAC)? Answer: Exchanging it for a visitor pass in another building

  19. Question: Which of the following is true of spillage? Answer: It can be either inadvertent or intentional.

  20. Question: When linked to a specific individual, which of the following is NOT an example of Personally Identifiable Information (PII)? Answer: Smartphone brand and model

  21. Question: You receive a text message from a vendor notifying you that your order is on hold due to needing updated payment information... What is the best course of action? Answer: Delete the message

  22. Question: Which of these is NOT a potential indicator that your device may be under a malicious code attack? Answer: An operating system update

  23. Question: Who designates whether information is classified and its classification level? Answer: Original classification authority

  24. Question: How can you protect data on a mobile device? Answer: Use two-factor authentication

  25. Question: Which of the following is a potential insider threat indicator? Answer: Death of a spouse

Level I Antiterrorism Awareness Training (2 hrs)

1) True or False: IEDs may come in many forms and may be camouflaged to blend in to the surrounding environment.

- False

- True (correct)

2) True or False: The initial moments of a hostage taking incident can be extremely dangerous.

- False

- True (correct)

3) True or False: Room invasions are not a significant security issue for hotels located within the United States.

- True

- False (correct)

4) True or False: When possible, it is best to always travel with a cell phone.

- False

- True (correct)

5) True or False: In the event of a skyjacking, you should immediately attempt to subdue the skyjackers.

- True

- False (correct)

6) True or False: Terrorists usually avoid tourist locations since they are not DOD-related.

- True

- False (correct)

7) True or False: Internet acquaintances can pose a security threat and should be carefully monitored.

- True (correct)

- False

8) True or False: Security is a team effort.

- False

- True (correct)

9) Early symptoms of a biological attack may appear the same as common illnesses. True or False?

- True (correct)

- False

10) True or False: Reasons for acquiring hostages include publicity, use as a bargaining chip while executing other crimes, the forcing of political concessions, and ransom.

- True (correct)

- False

11) True or False: From a security perspective, the best rooms are directly next to emergency exits.

- False (correct)

- True

12) Keeping a well-maintained vehicle is considered a "best practice" from both a security and safety perspective. True or False?

- False

- True (correct)

13) True or False: The ticketing area is more secure than the area beyond the security check point.

- False (correct)

- True

14) True or False: State Department Travel Warnings should be consulted prior to taking trips across the US-Mexican border.

- False

- True (correct)

15) What is NOT a physical security measure for your home?

- Changing locks to ensure key control.

- Confirming that a cleaning company is reliable and licensed.

- Hiding a key outside to ensure family members can get in if they lose their keys. (correct)

- Monitoring Internet acquaintances of all family members.

- Having good relations with neighbors and looking out for each other.

16) Which of the following is NOT a recommended response to an active shooter incident?

- Run and escape

- Hide

- Call 9-1-1, when it is safe to do so

- Provide instructions to arriving law enforcement personnel or stop them to ask for help (correct)

- Fight

17) From an antiterrorism perspective, espionage and security negligence are not considered insider threats.

- False (correct)

- True

18) Persons who have been given access to an installation can be counted on to be of no threat. True or False?

- False (correct)

- True

19) Electronic audio and video devices are never used by terrorists for surveillance purposes. True or False?

- True

- False (correct)

20) If you identify a possible surveillance attempt you should try to handle the situation yourself.

- False (correct)

- True

21) Alerts from the National Terrorism Advisory System apply only to the United States and its possessions.

- True (correct)

- False

22) True or False: Everyone on an installation has shared responsibility for security.

- True (correct)

- False

23) True or False: Surveillance can be performed through either stationary or mobile means.

- False

- True (correct)

24) What is the most increased Force Protection Level for a base/installation?

- Alpha

- Bravo

- Charlie

- Delta (correct)

25) From the following choices, select the factors you should consider to understand the threat in your environment. Select all that apply.

- Will local citizens warn Americans about terrorist groups? (correct)

- How active are terrorist groups? (correct)

- Are terrorist groups predictable? (correct)

- How sophisticated are terrorist groups? (correct)

- Are terrorist groups violent? (correct)

- What tactics and weapons are used by terrorist groups? (correct)

- Are terrorist groups in the area? (correct)

- Do terrorist groups attack Americans? (correct)

26) Select all factors that are ways in which you might become the victim of a terrorist attack.

- Association (correct)

- Location (correct)

- Opportunity (correct)

- Predictability (correct)

27) True or False: Individuals should Fight as last resort and only when your life is in imminent danger.

- True (correct)

- False

28) Knowing indicators of an unstable person can allow you to identify a potential insider threat before an incident.

- False

- True (correct)

Level I Antiterrorism Awareness Training

1) True or False: IEDs may come in many forms and may be camouflaged to blend in to the surrounding environment.

True (correct)

2) True or False: The initial moments of a hostage taking incident can be extremely dangerous.

True (correct)

3) True or False: Room invasions are not a significant security issue for hotels located within the United States.

False (correct)

4) True or False: When possible, it is best to always travel with a cell phone.

True (correct)

5) True or False: In the event of a skyjacking, you should immediately attempt to subdue the skyjackers.

False (correct)

6) True or False: Terrorists usually avoid tourist locations since they are not DOD-related.

False (correct)

7) True or False: Internet acquaintances can pose a security threat and should be carefully monitored.

True (correct)

8) True or False: Security is a team effort.

True (correct)

9) Which one of these is a possible indicator of a suspicious letter or package?

Excessive tape and/or postage (correct)

10) True or False: Reasons for acquiring hostages include publicity, use as a bargaining chip while executing other crimes, the forcing of political concessions, and ransom.

True (correct)

11) True or False: From a security perspective, the best rooms are directly next to emergency exits.

False (correct)

12) Which of the following is NOT a useful vehicle feature from a security perspective?

Wi-Fi capable (correct)

13) True or False: The ticketing area is more secure than the area beyond the security check point.

False (correct)

14) True or False: State Department Travel Warnings should be consulted prior to taking trips across the US-Mexican border.

True (correct)

15) Home security can be improved with self-help measures like changing locks, securing windows, and improving outdoor lighting. True or False?

True (correct)

16) Which of the following is NOT a recommended response to an active shooter incident?

Provide instructions to arriving law enforcement personnel or stop them to ask for help (correct)

17) From an antiterrorism perspective, espionage and security negligence are not considered insider threats.

False (correct)

18) Persons who have been given access to an installation can be counted on to be of no threat. True or False?

False (correct)

19) What is NOT a terrorist method of surveillance?

Breaking and entering to steal valuables (correct)

20) If you identify a possible surveillance attempt you should try to handle the situation yourself.

False (correct)

21) Alerts from the National Terrorism Advisory System apply only to the United States and its possessions.

True (correct)

22) True or False: Everyone on an installation has shared responsibility for security.

True (correct)

23) True or False: Surveillance can be performed through either stationary or mobile means.

True (correct)

24) What is the most increased Force Protection Level for a base/installation?

Delta (correct)

25) From the following choices, select the factors you should consider to understand the threat in your environment. Select all that apply.

What tactics and weapons are used by terrorist groups? (correct)

How active are terrorist groups? (correct)

Do terrorist groups attack Americans? (correct)

Are terrorist groups predictable? (correct)

Will local citizens warn Americans about terrorist groups? (correct)

Are terrorist groups in the area? (correct)

How sophisticated are terrorist groups? (correct)

Are terrorist groups violent? (correct)

26) Select all factors that are ways in which you might become the victim of a terrorist attack.

Location (correct)

Association (correct)

Opportunity (correct)

Predictability (correct)

27) True or False: Individuals should Fight as last resort and only when your life is in imminent danger.

True (correct)

28) Knowing indicators of an unstable person can allow you to identify a potential insider threat before an incident.

True (correct)