Social Engineering
Phishing
Cyber Breach
Malware
General Cyber
100

Facebook, Twitter, and LinkedIn are two examples of these

What is social media?

100

The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

What is a phishing email?

100

A documented, structured approach with instructions for responding to unplanned incidents.

What is a disaster recovery/incident response plan?

100

This is a computer program that spreads or self-replicates and requires user interaction to activate.

What is a virus?

100

Eight to twelve characters, upper- and lower-case letters, numbers as well as special characters, easy to remember but hard to guess, never shared with anyone, and never written down and left near your computer.

What are strong passwords?

200

These types of attacks involve someone who lacks the proper authentication following an employee into a restricted area.


What is tailgating?

200

The fraudulent practice of sending emails ostensibly from a known or trusted sender in order to induce targeted individuals to reveal confidential information.

What is Spear-phishing?

200

Examples include password protection or encryption to prevent a cyber breach.

What are the most common forms of securing a device?

200

Erratic computer behavior, lack of response to keyboard or mouse commands, crashing or restarting on its own, or running slower than usual.

What are symptoms of a malware infection?

200

Tasks includes reviewing and investigating enterprise security threats, and providing best practices to assist agencies

What is State of Arizona Security Operations Center?

300

Social networking scams, vulnerability exploits, mobile malware, malicious spam runs, and targeted attacks are all examples of these.

What are online threats?

300

The email asks you to confirm personal information, the web and email addresses do not look genuine, it’s poorly written, there’s a suspicious attachment, the message is designed to make you panic.

What are ways to identify a potential phishing email?

300

Prepare, Identify, Contain, Respond, Recover

What are the incident response steps?

300

A type of malicious software designed to block access to a computer system until a sum of money is paid.

What is Ransomware?

300

Watching (either in person or using a recording device) what you do on your computer by looking at a reflection of or the actual screen of your computer or mobile device.

What is shoulder surfing?

400

Examples include: IRS threatening arrest, Social Security number being suspended, you have a legal issue pending, Car warranty, Swapping payroll and direct deposit information, and Sending gift cards.

What are scams?

400

A claim that there is a "problem" with your account, notice that you have been "suspected violations of the USA Patriot Act," request to "verify your identity," request from an IT department that you provide passwords or other information, or a request to fax information to a number are all examples of this.

What are things you might see in an email if it is a phishing scam?

400

Examples include, public, health, tax, credit card, banking, criminal, and educational.

What are ways to classify data?

400

It is contained in a valid program and usually offers the promise of something you might be interested in, such as a screen saver or photograph, but is designed to give hackers access to your computer or files.

What is a Trojan Horse?

400

Who is State CISO Tim Roemer?

500

An approach to gain access to information through misrepresentation--the conscious manipulation of people to obtain information without having them realize that a security breach may be occurring--that may take the form of impersonation via telephone, in person, or email.

What is social engineering?

500

A term used to describe a phishing attack that is specifically aimed at wealthy, powerful, or prominent individuals.

What is Whale Phishing?

500

Using unauthorized applications, having un-encrypted data storage, emailing confidential data to your personal account, downloading or printing sensitive data.

What is a potential cyber security breach?

500

Defined as programs that track where you go on the Internet and what you type into your keyboard.

What is spyware/keylogger?

500

The site you would report cyber incidents to.

M
e
n
u