Cyber Awareness Army 2025
This deck covers essential questions and answers related to cyber awareness for Army personnel in 2025, focusing on best practices for security, handling classified information, and safe use of technology.
How can you prevent viruses and malicious code?
○View e-mail using the Preview Pane rather than opening it
○ Scan all e-mail attachments
○ Allow mobile code to run on all websites
○ E-mail infected files to your security POC
Scan all e-mail attachments
Key Terms
How can you prevent viruses and malicious code?
○View e-mail using the Preview Pane rather than opening it
○ Scan all e-mail attachments
○ Allow mobile code to run on all websites
○ E-mail infected files to your security POC
Scan all e-mail attachments
As you browse a social media site, you come across photos of information with classification markings. What should you do?
○ Notify your security point of contact
○ Download the information to your computer.
○ You may forward the URL to the information to interested parties.
○ You are authorized to respond to inquiries about it.
Notify your security point of contact
Which of the following can be used to catalogue information about you?
Social networking sites
○ Audio-enabled digital assistants (e.g., Siri, Alexa)
○ Fitness trackers
○ All of these
All of these
Which of the following uses of removable media is allowed?
○ Nickgy uses Undlassified government owned removable media to transfer work files to a personal laptop.
○ Sam uses approved Government owned removable media to transfer files between government systems as authorized.
○ Cameron connects a personal phone to an Unclassified government laptop to charge.
○Alex uses personally owned removable media on an Unclassified government laptop to transfer personal music files
Sam uses approved Government owned removable media to transfer files between government systems as authorized.
Which of the following is a best practice for protecting your home wireless network
for telework or remote work?
○ Turn off al other devices that connect to your router while working
○ Use your router's pre-set Service Set identifier (SSID) and password Implement, a5 a minimum, Wi-Fi Protected Access 2 (WPA2) Personal encryption Open access to your network to all devices
Implement, as a minimum, Wi-Fi Protected Access 2 (WPA2) Personal encryption.
Which of the following is permitted within a Sensitive Compartmented Information Facility (SCIF)?
A Govemment-issued smartphone D An authorized Government-owned Portable Electronic Device (PED) # A Government-issued laptop with Wi-fi capability fe A Bluetooth medical device, such as glucose monitor
An authorized Government-owned Portable Electronic Device (PED).
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
Term | Definition |
---|---|
How can you prevent viruses and malicious code? | Scan all e-mail attachments |
As you browse a social media site, you come across photos of information with classification markings. What should you do? | Notify your security point of contact |
Which of the following can be used to catalogue information about you? | All of these |
Which of the following uses of removable media is allowed? | Sam uses approved Government owned removable media to transfer files between government systems as authorized. |
Which of the following is a best practice for protecting your home wireless network | Implement, as a minimum, Wi-Fi Protected Access 2 (WPA2) Personal encryption. |
Which of the following is permitted within a Sensitive Compartmented Information Facility (SCIF)? | An authorized Government-owned Portable Electronic Device (PED). |
Which of the following is permitted when using an unclassified laptop within a collateral classified space? | A personally-owned wired headset without microphone |
Which of these is NOT a potential indicator that your device may be under a | An operating system update |
Which of the following is a best practice when browsing the Internet? | Look for https in the URL name |
How can you protect data on a mobile device? | Use two-factor authentication |
Which of the following is true of removable media and portable electronic devices (PEDs)? | The risks associated with them may lead to loss of life |
Which of the following is an allowed use of government furnished equipment | E-mailing your supervisor |
Adam sees a coworker who does not have the reguired clearance with a printed ◦ document marked as Sensitive Compartmented Information (SCI). What should he do? | Adam should immediately contact his security Point of Contact (POC) to report the incident and ensure the document’s security. He must not confront the coworker or handle the document himself. |
Which of the following poses a security risk while teleworking in an environment where Internet of Things (loT) devices are present? | All of these |
When is the safest time to post on social media about your work-related travel? | After the trip. |
Which of the following is true of transmitting or transporting Sensitive Compartmented Information (SCI)? | You must be courier-briefed for SCI to transport it. |
Which of the following is true of Sensitiye Compartmented Information Facilities | Personnel should physically assess whether everyone within listening distance has need-to-know before starting conversations involving classified information |
Which of the following is NOT an appropriate use of. your Common Access Card | Exchanging it for a visitor pass in another building |
Your meeting notes are Unclassified. This means that your notes: May be released to the public. Do not have the potential to damage national security. Do not have the potential to affect the safety of personnel, missions, or systems, Do not require any markings. | do not have the potential to damage national security |
Employee Passport Number Adams, Jeff A12345678 Brown, Marty B23456789 Clark, Tina C34567890 | ALL |