What is the term for fraudulent emails or messages that appear to come from reputable sources, designed to trick individuals into revealing sensitive information?
What is phishing?
To create strong passwords, it's recommended to use a combination of uppercase letters, lowercase letters, numbers, and special characters. What is this type of password called?
What is a complex or strong password?
What is the term for a self-replicating malicious program that spreads to other computers or devices?
What is a virus?
What is the purpose of a firewall in network security?
What is to monitor and control incoming and outgoing network traffic?
What is the initial step an employee should take when they suspect a cybersecurity incident?
What is reporting the incident to the designated IT or security personnel?
How can you verify the authenticity of an email sender to avoid falling for phishing attempts?
What is checking the email sender's address?
How often should you update your passwords for various accounts to enhance security?
What is regularly or periodically?
What is the primary purpose of antivirus software?
What is to detect and remove malicious software from a computer?
What does the acronym VPN stand for, and how does it enhance network security?
What is Virtual Private Network, and it secures communication over the internet by encrypting data?
Define the term "breach response time" in incident response.
What is the time it takes to detect and respond to a security breach effectively?
What is a common warning sign of a phishing email that users should look out for in the email content?
What is misspellings or grammatical errors?
What is the term for using the same password across multiple accounts, making all of them vulnerable if one is compromised?
What is password reuse?
How can users minimize the risk of downloading malware when installing software?
What is downloading from official and reputable sources?
What is a common security measure to protect a Wi-Fi network from unauthorized access?
What is using a strong, unique password and enabling WPA2/WPA3 encryption?
In the context of incident response, what does the acronym "CSIRT" stand for?
What is Computer Security Incident Response Team?
Name one precautionary step to avoid clicking on malicious links in emails.
What is hovering over the link to preview the URL?
What is the purpose of multi-factor authentication (MFA) in enhancing password security?
What is adding an extra layer of security by requiring additional verification besides a password?
What is ransomware, and how does it typically impact a user's data?
What is malicious software that encrypts data, demanding a ransom for its release?
What is a DDoS attack, and how does it impact a network?
What is a Distributed Denial of Service attack, overwhelming a network with a flood of traffic, causing disruption?
What role does communication play in incident response, and why is it crucial?
What is keeping stakeholders informed about the incident's status and coordinating response efforts?
In a spear-phishing attack, what makes the phishing attempt more targeted compared to a regular phishing attack?
What is personalized and specific information about the target?
In the context of password security, what does the acronym "PBKDF2" stand for?
What is Password-Based Key Derivation Function 2?
What security measure can help protect against malware infections on a computer?
What is keeping antivirus software and operating systems up-to-date?
How can employees contribute to maintaining network security in a workplace?
What is avoiding the use of unauthorized devices on the network and reporting suspicious activities?
Name one key component of an incident response plan.
What is a communication plan, data backup and recovery, or a chain of custody process?