DoD Annual TrainingAnswer Key

Malicious Code Cyber Awareness Challenge

10 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

What is the possible effect of malicious code?

ANSWER

Files may be corrupted, erased, or compromised.

QUESTION 2

How should you respond to the theft of your identity?

ANSWER

Report the crime to local law enforcement

QUESTION 3

How can you protect yourself from internet hoaxes?

ANSWER

Use online sites to confirm or expose potential hoaxes

QUESTION 4

What is whaling?

ANSWER

A type of phishing targeted at senior officials.

QUESTION 5

How can you protect yourself from social engineering?

ANSWER

Follow instructions given only by verified personnel

QUESTION 6

Which of the following is true of traveling overseas with a mobile phone?

ANSWER

It may be compromised as soon as you exit the plane

QUESTION 7

What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)?

ANSWER

Encrypt any files that you store there (Wrong answer)

QUESTION 8

Which of the following is an example of removable media?

ANSWER

Flash drive

QUESTION 9

Which of the following is an example of near field communication (NFC)?

ANSWER

A smartphone that transmits credit card payment information when held in proximity to a credit card reader

QUESTION 10

Which of the following statements is true of using Internet of Things (IoT) devices in your home?

ANSWER

An unsecured IoT device can become an attack vector to any other device on your home network, including your Government laptop

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials