Skip to content

Cyber Awareness Challenge 2025 Standard Challenge

🔹

Meeting Notes: Your meeting notes are Unclassified. This means that your notes:

May be released to the public.
Do not have the potential to damage national security.
Do not have the potential to affect the safety of personnel, missions, or systems.
Do not require any markings.

🔹

Personnel Roster: What type of information does this personnel roster represent?

Unclassified information
Controlled Unclassified Information (CUI)
For Official Use Only (FOUO) Information

🔹

Personnel Roster: When e-mailing this personnel roster, which of the following should you do?

Encrypt the PII
Digitally sign the e-mail
Use your Government e-mail account

🔹

Select an area in which to edit an electronic report that is classified.

Your Office
Common Area
Conference Room
Designated Secure Area

🔹

Select an action to take in response to compromised Sensitive Compartmented Information (SCI).

Gather more information
Call your security point of contact (POC)
Do nothing

🔹

Printer Clue: Dr. Dove printed a classified document and retrieved it promptly from the printer. Does this behavior represent a security concern?

Yes
No

🔹

Workstation Clue: Col. Cockatiel stored an unmarked document on the classified network. Does this behavior represent a security concern?

Yes
No

🔹

Conversation Area Clue: Mr. Macaw and a colleague had a conversartion about a shared project in the SCIF after verifying no one was nearby. Does this behavior represent a security concern?

Yes
No

🔹

Which of these individuals demonstrated behavior that could lead to the compromise of SCI?

Dr. Dove
Col. Cockatiel
Mr. Macaw

🔹

Open Office Area: Which of the following poses a physical security risk?

Posting an access roster in public view
Using your Common Access Card (CAC) for facility access
Challenging people without proper badges

🔹

Collateral Classified Space: Which of t he following must you do when using an unclassified laptopo in a colateral classified environment?

Use a wireless headset
Disable the embedded camera, microphone, and Wi-Fi
Use government-issued wired peripherals

🔹

Sensitive Compartmented Information Facility (SCIF): Which of the following must you do when working in a SCIF?

Verigy that all personnel in list
Ensure that monitors do not provide unobstructed views
Escort uncleared personnel and warn other in the SCIF

🔹

My troop is selling cookies. You need to help me!: Is this an appropriate use of government-furnished equipment (GFE)?

Yes
No

🔹

My troop is selling cookies. You need to help me!: This is not an appropriate use of GFE. Why?

You should not use government e-mail to sell anything.
You should use a digital signature when sending hyperlinks.
You should not use unauthorized services, such as fileshare services, on GFE.

🔹

How do you secure your accounts? (Alex)

Yes
Maybe
No

🔹

What kind of passwords do you use? (Bailey)

Yes
Maybe
No

🔹

How do you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) Card? (Charlie)

Yes
Maybe
No

🔹

Select the individual who securely authenticates their identity.

Alex
Bailey
Charlie

🔹

How can malicious code spread? Select all that apply. Then select Submit.

E-mail attachments
Downloading files
Visiting infected websites
Virus scans

🔹

How can you prevent the download of malicious code? Select all that apply. Then select Submit.

Scan external files before uploading to your device
Research apps and their vulnerabilities before downloading
Use the Preview Pane to view e-mails
Disable automatic security patches

🔹

Which of the following may indicate a malicious code attack? Select all that apply. Then select Submit.

The device re-starts following a system update.
A new app suddenly appears on the device.
The device slows down.
A new tab appears in the Web browser.

🔹

Setup your e-mail account


🔹

Alert: E-mail Storage Quota Exceeded - How many social engineering indicators are present in this e-mail?

0
1
2
3+

🔹

DoD Software shared "Approved Software List" with you

0
1
2
3+

🔹

You find an unlabeled thumb drive in the parking area outside your workplace. What should you do?

Plug it into your work computer to find out more about it
Leave it alone
Turn it in to your security officer

🔹

Which payment method poses the least risk?

Cash
Digital credit card on smartphone

🔹

Which method of getting online poses the least risk?

Approved mobile hotspot
Coffee shop Wi-Fi

🔹

Which action will keep DoD data the safest?

Change seats
Leave the coffee shop

🔹

Create Post - Everyone should see the new superhero movie! The special effects are fantastic on the big screen!

Delete
Post

🔹

Friend Request - Shaun S. 2 shared connections

Deny
Accept

🔹

Share a Post - Soda Scare!

Keep Scrolling
Re-post

🔹

Fwd: Save Thanksgiving - From Hope N.

Research Claim
Research Link
Open Link

🔹

True or false? Voice-activated smart devices can collect and share your personal information.

True
False

🔹

True or false? The best way to keep your passport safe is to carry it with you.

True
False

🔹

True or false? You should monitor your credit card statements for unauthorized purchases.

True
False

🔹

Does Bob demonstrate potential insider threat indicators?

Yes
No

🔹

How should Bob's colleagues respond?

Confront Bob
Report Bob
Avoid Bob

🔹

What step should be taken next to securely telework?

Connect peripherals
Secure the area so others cannot view your monitor

🔹

Which of these personally-owned computer peripherals may be used with government-furnished equipment?

HDMI monitor
USB keyboard
Wireless mouse

🔹

Does this action pose a potential security risk? "Smart Speaker near workspace"

Yes
No

🔹

Virus and Threat Protection - None Detected - Install?

Yes
No

🔹

User Accounts - Would you like to create a user profile?

Yes
No

🔹

Firewall Protection - Would you like to enable firewall?

Yes
No