Malicious Code Cyber Awareness Challenge
10 community-sourced questions and answers. Free — no login.
What is the possible effect of malicious code?
Files may be corrupted, erased, or compromised.
How should you respond to the theft of your identity?
Report the crime to local law enforcement
How can you protect yourself from internet hoaxes?
Use online sites to confirm or expose potential hoaxes
What is whaling?
A type of phishing targeted at senior officials.
How can you protect yourself from social engineering?
Follow instructions given only by verified personnel
Which of the following is true of traveling overseas with a mobile phone?
It may be compromised as soon as you exit the plane
What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)?
Encrypt any files that you store there (Wrong answer)
Which of the following is an example of removable media?
Flash drive
Which of the following is an example of near field communication (NFC)?
A smartphone that transmits credit card payment information when held in proximity to a credit card reader
Which of the following statements is true of using Internet of Things (IoT) devices in your home?
An unsecured IoT device can become an attack vector to any other device on your home network, including your Government laptop
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials