General
Security Awareness
Physical Security
Passwords
Internet & Email
Policy & Procedures
100

The group responsible for information security.

Who is everyone?

100

When a person enters a secured building right after another person without badging in.

What is piggybacking?

100

A string of words that must be used to gain access to a computer system or service.

What is a passphrase?

100

An attack in which the threat actor poses as a trusted person or organization to trick potential victims into sharing sensitive information or sending them money.

What is phishing?

100

A formal document that outlines the guidelines, principles and expectations governing various aspects of an organization's expectations.

What is a Policy?

200

The ongoing process of educating and training individuals to understand cyber threats, such as phishing and malware, and to adopt behaviors that protect sensitive information and systems from compromise

Cybersecurity Awareness 

200

Visitors to our company locations are required to sign-in at the reception desk upon entering the facility. Sign-in tracking will be accomplished through the use of this type of documentation.

What is a visitor control log?

200

Writing down passwords on this makes it easier to remember, but increases the risk of someone finding it.

What is a post-it note?

200

The action you should take when your receive a suspicious email.

What is report as suspicious? (Phish Alert Button)

200

A cybersecurity exercise where an organization sends fake phishing emails to its employees to assess their ability to recognize and respond to phishing attempts

What is ta phishing test?

300

This type of information consists of 18 identifiers such as: Name, Address, Birthday, Phone Number, Fax Number, Email Address, Social Security Number, Medical Record Number, Health plan beneficiary number, etc.

What is PII? 

300

A good practice that consists of locking up confidential documents, locking your screen, and ensuring your area is secure before walking away.

What is a clean desk?

300

A technology tool that helps internet users create, save, manage and use passwords across different online services.

What is a password manager?

300

The use of personality, knowledge of human nature and social skills to steal passwords, key tokens or other credentials to gain access to systems.

What is Social Engineering?

300

Where are all polices located for review?

SharePoint


400

The action one should take in the event a work device is lost or stolen.

What is report? (or notify IT)

400

A place to dispose of confidential documents.


What is a secure shred bin?

400

An identification method that enables users to log in to multiple applications and websites with one set of credentials.

What is SSO? (or Single Sign On)

400

An umbrella term for different kinds of malicious software and is defined as any executable code that uses a computer in a way not authorized by it's owner.

What is malware?

400

This policy requires annual review and sign off by all employees.

What is the Comprehensive Information Security Policy (CISP)?

500

Instances where personal information is lost, stolen, hacked into, or accessed without permission.

What is a data breach?

500

A security protection that automatically occurs when a device has been inactive for a certain amount of time.

What is screen lockout?

500

123456, 123456789, qwerty, password, 12345, qwerty123, 1q2w3e, 12345678, 111111, 1234567890

What are the 2022 top 10 most common passwords?

500

A video of a person in which their face or body has been digitally altered so that they appear to be someone else, typically used maliciously or to spread false information.

What is a deepfake? 

M
e
n
u