NIST CSF Mandatory?
False. NIST CSF is voluntary.
AAA
Authentication, Authorization, Accounting
This security model assumes no user or device is automatically trusted, even if it is inside the network.
Zero Trust
GMF was formerly known as..
Americredit
What does “HTTP” stand for?
HyperText Transfer Protocol
Most well-known framework for implementing, maintaining, and managing your ISMS
ISO 27001
EDR
Endpoint Detection and Response
This type of social engineering attack uses text messages to trick victims into clicking malicious links or revealing personal information.
SMShing
This program encourages GMF employees to engage in wellness activities
Shift to Wellness
This athlete was the Super Bowl 2026 MVP
Kenneth Walker III
NIST functions
Identify
Protect
Detect
Respond
Recover
Govern
CVE
Common Vulnerabilities and Exposures
This type of malware disguises itself as legitimate software to trick users into installing it, then performs malicious actions.
Trojan Horse
Which strategic priority? Co-develop valuable solutions that go beyond the vehicle to deepen our relationship with customers
Partner with GM
What country does the island of Tasmania belong to?
Australia
A standard awareness document that highlights the most critical security risks to web applications.
OWASP Top Ten
Cross-Site Scripting
This term refers to hardware, software, or cloud services used by employees without approval from the IT department.
Shadow IT
We have offices in these Latin American Countries:
Brazil
Chile
Mexico
Colombia
Peru
What year did World War II end?
1945
This CSF 2.0 feature helps organizations describe their current and desired cybersecurity outcomes without referencing specific tools or controls.
Profile
MTTD
Mean Time to Detect
This type of malicious software secretly records keystrokes to capture passwords and sensitive information.
Key logger
This is GMF's global approach to giving feedback
Compassionate Candor
What programming language was originally called “Oak”?
Java