THIS TERM DESCIRBES A PERSON WHO BREAKS INTO COMPUTER SYSTEMS
A HACKER
THIS COMPUTER–GENERATED SIMULATION OF A 3D ENVIRONMENT ENABLES USERS TO EXPLORE AND INTERACT WITH A VIRTUAL SURROUNDING.
VIRTUAL REALITY
THIS PRACTICE INVOLVES CREATING COMPLEX ACCESS CREDENTIALS BY MIXING LETTERS, NUMBERS, AND SYMBOLS
STRONG PASSWORDS
THIS COMMON SOCIAL ENGINEERING ATTACK INVOLVES TRICKING INDIVIDUALS INTO REVEALING SENSITIVE INFORMATION
PHISHING
SOLVE PROBLEMS WITH IMAGINATION AND LOGIC; SYNTHESIZE AND APPLY KNOWLEDGE OR UNDERSTANDING FROM DIFFERENT REALMS.
INVESTIGATOR
PII IS DATA USED TO IDENTIFY THE IDENTITY OF AN INDIVIDUAL. WHAT DOES PII STAND FOR?
PERSONALLY IDENTIFIABLE INFORMATION
TRUE OR FALSE:
CLOUD COMPUTING IS THE DELIVERY OF DIFFERENT SERVICES THROUGH THE INTERNET.
TRUE
THIS ADDS AN EXTRA LAYER OF SECURITY BEYOND PASSWORDS, OFTEN INVOLVING A CODE SENT TO YOUR PHONE
TWO-FACTOR AUTHENTICATION
(2FA)
IN THIS TYPE OF ATTACK, AN UNAUTHORIZED INDIVIDUAL GAINS PHYSICAL ACCESS TO A RESTRICTED AREA BY FOLLOWING AN AUTHORIZED PERSON
TAILGATING
GATHER AND STUDY INFORMATION TO INDETIFY PATTERNS AND MAKE MEANING; SIFT OUT DISTRACTIONS AND IRRELEVANT INFORMATION TO HOME IN ON THE KEY ISSUE OR PROBLEM.
ANALYST
OFTEN REFERRED TO AS JUNK EMAIL, RECEIVING UNWANTED/UNSOLICITED MESSAGES IS KNOWN AS WHAT?
SPAM
AI IS THE SIMULATION OF HUMAN INTELLIGENCE IN MACHINES THAT ARE PROGRAMMED TO THINK AND ACT LIKE HUMANS. WHAT DOES AI STAND FOR?
ARTIFICIAL INTELLIGENCE
WHICH SECURITY PRACTICE INVOLVES EDUCATING INDIVIDUALS ABOUT COMMON CYBER THREATS AND HOW TO RECOGNIZE AND RESPOND TO THEM?
A. DATA ENCRYPTION
B. SECURITY AWARENESS TRAINING
C. SOFTWARE UPDATES
D. BACKUP & RECOVERY
B. SECURITY AWARENESS TRAINING
TRUE OR FALSE
SOCIAL ENGINEERING RELIES SOLELY ON TECHNICAL VULNERABILITIES TO EXPLOIT SYSTEMS
FALSE
FIND THE WEAK POINTS OR VULNERABILITIES OF A SYSTEM; IDENTIFY FLAWS OR MISTAKES AND POINT TOWARDS SOLUTIONS.
PROTECTOR
THIS SPECIAL FEATURE ALLOWS PARENTS TO RESTRICT ACESS TO WHAT TYPE OF CONTENT THEIR CHILDREN CAN VIEW.
PARENTAL CONTROLS
IN DEC 2023, THIS GAMING SYSTEM SOLD OVER 50 MILLION IN SALES – EVEN OUTSELLING THE XBOX SERIES X , 3 TO 1.
PLAYSTATION 5 (PS5)
THIS TERM DESCRIBES REGULARLY UPDATING SOFTWARE TO PROTECT AGAINST KNOWN VULNERABILITIES
SOFTWARE UPDATES
WHICH OF THE FOLLOWING IS NOT A POTENTIAL CONSEQUENCE OF FALLING VICTIM TO A SOCIAL ENGINEERING ATTACK?
A. FINANCIAL LOSS
B. IDENTITY THEFT
C.IMPROVED SECURITY POSTURE
D. REPUTATION DAMAGE
C. IMPROVED SECURITY POSTURE
USE ABSTRACT REASONING OR LOGIC TO ANSWER QUESTIONS OR BUILD SOLUTIONS; A GRASP OF MATHEMATICAL AND SPATIAL RELATIONSHIPS HELPS GREATLY.
PROGRAMMER
“I’VE PERMANENTLY BLOCKED YOU FROM ACCESSING YOUR PERSONAL INFORMATION. IF YOU WANT IT BACK, YOU’LL HAVE TO PAY ME.” THIS IS AN EXAMPLE OF:
A. RANSOMWARE
B. SPYWARE
C. WORMS
A. RANSOMWARE
TRUE OR FALSE:
TELEWORK IS DEFINED AS THE USE OF DIGITAL INFORMATION AND COMMUNICATION TECHNOLOGIES TO ACCESS HEALTH CARE SERVICES REMOTELY AND MANAGE YOUR HEALTH CARE
FALSE
THIS INVOLVES CREATING DUPLICATE COPIES OF DATA TO ENSURE IT CAN BE RECOVERED AFTER AN INCIDENT
BACKUP & RECOVERY
WHAT IS THE BEST DEFENSE AGAINST SOCIAL ENGINEERING TACTICS?
A. REGULARLY UPDATING ANTIVIRUS SOFTWARE
B. ENCRYPTING ALL DATA ON A NETWORK
C. INCREASING FIREWALL STRENGTH
D. TRAINING EMPLOYEES TO RECOGNIZE AND REPORT SUSPICIOUS ACTIVITY
D. TRAINING EMPLOYEES TO RECOGNIZE AND REPORT SUSPICIOUS ACTIVITY
ORGANIZE TASKS, CONNECT SPECIFIC PROBLEMS TO LARGER CONTEXTS OF SECURITY NEEDS, COORDINATE AND LEAD TEAMS.
MANAGER