Types of Malware
Data Protection
Email Security
Physical Security
100

Restricts access to a computer or data and demands a ransom.

A) Ransomware

B) Trojan Horse

C) Spyware

100

A tool used to manage multiple passwords to many applications in one centralized place

A) Password manager

B) PP-F (Passphrase farm)

C) On a sticky note under your keyboard

100

Deceptive e-mails designed to collect personal information by appearing legitimate.

A) Phishing emails

B) Malware Mail (MM)

C) Personal Information Exploitation (PIE)

100

When should you lock your computer screen?

A) Every time you leave your desk unattended

B) When you leave work for the day

C) You don't - Windows does this automatically

200

Harmful programs designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems.

A) Computer Virus

B) Cyber Attack

C) Malware

200

A tool that allows a user to remain anonymous by encrypting their traffic over the internet?

A) Proxy-based emulation

B) Incognito Mode

C) VPN (Virtual Private Network)

200

A coordinated email attack that is directed toward a high profile target in the organization.

1) Whaling

2) Spear Phishing

3) Vishing

200

What should you do first if you lose your access card?

A) Go to IT for a new card

B) Report the card as stolen so that it can be deactivated

C) Try to find it as soon as possible

300

Which of the following answers refers to an undocumented (and often legitimate) way of gaining access to a program, online service, or an entire computer system?

A) Logic Bomb

B) Trojan Horse

C) Backdoor


300

What Anti-Virus software does Genoa use to defend individual workstations from malware?

A) Windows Security

B) Forticlient

C) Webex Teams

300

When you receive a malicious email, should it be forwarded to another department for verification?

A) Yes, so that proper action can be taken

B) No, reporting the email using the PAB plugin is all that is required

C) No, delete it from your inbox


300

What is "Tailgating"?

A) Stealing information from an unlocked workstation

B) Gaining unauthorized access to a building by following someone inside

C) A technique used to copy access cards

400

A type of malware that replicates itself across the computer network to other machines.

A) Computer Virus

B) Worm

C) Batch File

400

A software/hardware tool that monitors and controls incoming and outgoing data based on "rules"?

A) Networking Monitoring System

B) Firewall

C) Router

400

With regards to email security, what is "Domain Spoofing"?

A) When the attacker appears to use a company's domain (@genoadesign.com) to appear legitimate

B) Email validation of incoming mail messages

C) Using branded images in email to validate your identity to external clients

400

A technique that uses a unique part of your body for verifying access to resources?

A) 2FA (Two-Factor Authentication)

B) Biometrics 

C) PIF Authentication (Personal Identity Fingerprinting)

M
e
n
u