Scenarios
MSSND Terminology
True or False
Fill in the Blanks
100

Before leaving your device/ desktop at work, what should you always do?

What is 'locking your computer?'

100

Before leaving your device/ desktop at work, what should you always do?

What is 'locking your computer?'

100

T/F: Passwords must be a mixture of letters, numbers, and symbols with a length of at least 8 to around 12 characters.

What is 'false; passwords should be 8 to 15 characters in length?'

100

MSSND stands for __________.

What is 'Minimum Security Standards for Network Devices?'

200

You receive a phone call from an antivirus company. After visiting a site, you immediately receive a pop- up message alerting you that you received a virus and that you need to download the anti-virus software immediately. Do you do it?

What is 'no?'

200

Personal devices accessing systems with legally protected information should have...

What is an 'encrypted hard drive?'

200

T/F: PL2 examples are financial information, medical information, and social security number.

What is 'true?'

200

T/F: The three ways Calnet 2- Step Authentication can alert your device of attempted access are ______, ______, and ______.

What are 'send me a push, call me, and enter a passcode?'

300

A police officer calls to ask for sensitive information on a student. You decline their request.

What is 'do not give any sensitive information on the student because of FERPA?'

300

The firewall on your computer should always be on to limit connections of...

What are 'IP addresses and ports?'

300

T/F: If you are working remotely on a personal device at home, you do not need to follow MSSND?

What is 'false?'

300

T/F: Three MSSND requirements are _______, _______, and ______ (there are 9 possible right answers).

What is...

  1. No unencrypted authentication

  2. No unattended console sessions (Lockout policy)

  3. Software patch updates

  4. Antivirus program

  5. Use of authentication

  6. Firewall

  7. Passphrase complexity

  8. Privileged accounts

  9. No unnecessary services

400

Your computer has been compromised and you have immediately taken it off the network after remembering the training your received from your awesome InfoSec training. This is the next step.

What is 'changing your passwords on another trusted machine?'

400

Malware that encrypts documents and and other potentially mission critical content on computers, network shares, or entire computing environments often for money is called...

What is 'ransomware?'

400

T/F: According to the MSSND rule about software patch updates, software should be no more than 3 updates behind.

What is 'false?'

400

T/F: Anti-malware software works to _______,________, and ________.

What are 'block, detect, remove?'

500

You receive an email from you bank asking you to confirm some information. The email includes a link that seems to be the correct link to your bank. You do these things before clicking the link.

What is 'hovering over the link to check the hyperlink, checking the “from” email, and calling your bank?'

500

A standard security protocol for establishing encrypted links between a web server and a browser in an online communication is...

What is 'SSL (secure socket layer)?'

500

Port 443's protocol is HTTPS, which is used for authenticated network sessions.

What is 'true?'

500

The CIA triad stands for ______, ______, and ______.

What is 'confidentiality, integrity, and availability?'

M
e
n
u