Cyber Awareness Challenge 2025 Standard Challenge
Meeting Notes: Your meeting notes are Unclassified. This means that your notes:
Personnel Roster: What type of information does this personnel roster represent?
Personnel Roster: When e-mailing this personnel roster, which of the following should you do?
Select an area in which to edit an electronic report that is classified.
Select an action to take in response to compromised Sensitive Compartmented Information (SCI).
Printer Clue: Dr. Dove printed a classified document and retrieved it promptly from the printer. Does this behavior represent a security concern?
Workstation Clue: Col. Cockatiel stored an unmarked document on the classified network. Does this behavior represent a security concern?
Conversation Area Clue: Mr. Macaw and a colleague had a conversartion about a shared project in the SCIF after verifying no one was nearby. Does this behavior represent a security concern?
Which of these individuals demonstrated behavior that could lead to the compromise of SCI?
Open Office Area: Which of the following poses a physical security risk?
Collateral Classified Space: Which of t he following must you do when using an unclassified laptopo in a colateral classified environment?
Sensitive Compartmented Information Facility (SCIF): Which of the following must you do when working in a SCIF?
My troop is selling cookies. You need to help me!: Is this an appropriate use of government-furnished equipment (GFE)?
My troop is selling cookies. You need to help me!: This is not an appropriate use of GFE. Why?
How do you secure your accounts? (Alex)
What kind of passwords do you use? (Bailey)
How do you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) Card? (Charlie)
Select the individual who securely authenticates their identity.
How can malicious code spread? Select all that apply. Then select Submit.
How can you prevent the download of malicious code? Select all that apply. Then select Submit.
Which of the following may indicate a malicious code attack? Select all that apply. Then select Submit.
Setup your e-mail account
Alert: E-mail Storage Quota Exceeded - How many social engineering indicators are present in this e-mail?
DoD Software shared "Approved Software List" with you
You find an unlabeled thumb drive in the parking area outside your workplace. What should you do?
Which payment method poses the least risk?
Which method of getting online poses the least risk?
Which action will keep DoD data the safest?
Create Post - Everyone should see the new superhero movie! The special effects are fantastic on the big screen!
Friend Request - Shaun S. 2 shared connections
Share a Post - Soda Scare!
Fwd: Save Thanksgiving - From Hope N.
True or false? Voice-activated smart devices can collect and share your personal information.
True or false? The best way to keep your passport safe is to carry it with you.
True or false? You should monitor your credit card statements for unauthorized purchases.
Does Bob demonstrate potential insider threat indicators?
How should Bob's colleagues respond?
What step should be taken next to securely telework?
Which of these personally-owned computer peripherals may be used with government-furnished equipment?
Does this action pose a potential security risk? "Smart Speaker near workspace"
Virus and Threat Protection - None Detected - Install?
User Accounts - Would you like to create a user profile?
Firewall Protection - Would you like to enable firewall?