The current preferred method of authentication
A) Username/Password
B) Digital PIN
C) PIV
D) Security Questionairre
What is PIV
When leaving your computer for a short time and coming back
A) Lock it
B) Log off of it
C) Restart it
D) Shut it down
Social Security Numbers, Drivers License Numbers, Bank Accounts, Home Addresses
A) Public Information
B) Confidential Information
C) Personally Identifiable Information
D) Secret Information
What is Personally Identifiable Information
Suspected phishing emails should
A) Be Deleted
B) Be Reported
C) Left Alone
D) Replied To
What is Be Reported
Lost Your Device? First...
A) Tell No One
B) Contact the Police
C) Contact Customer Support
D) Contact your Manager
What is Contact Customer Support
Combination of Authentication Methods
A) Multi-Factor Authentication
B) Secure Authentication Management
C) Defense-in-Depth Authentication
D) Biometric Authentication
What is Multi-Factor Authentication
Responsible party for ensuring data security
A) IT Staff
B) Cyber Security Operations
C) All employees
D) Privacy Office
What are All Employees
Unauthorized release of personal information
A) Data Breach
B) Information Compromise
C) Contained Incident
D) Information Hack
What is Data Breach
Phishing Attack with Specific Targets
A) Vishing
B) Spear Phishing
C) Target Phishing
D) Shark Phishing
What is Spear Phishing
Suspicious Email?
A) Delete It
B) Report It
C) Reply to It
D) Contact Customer Support
What is Report It
Biometric Authentication is
A) Something you are
B) Something you know
C) Something you have
D) Somewhere you are
What is something you are
The biggest security liability in an organization
A) Employees
B) Insecure configuration of systems
C) Faulty software
D) Public perception/popularity
What are Employees
Organization Lead on Determining Training and Policy related to Privacy
A) Senior Privacy Specialist
B) Chief Privacy Officer
C) Chief Information Officer
D) Inspector General
Who is Chief Privacy Officer
Phishing Attack Targeting Executives
A) Spear Phishing
B) Shark Phishing
C) Whaling
D) Vishing
What is Whaling
Breach of Personal Privacy?
A) Tell No One
B) Contact the Police
C) Contact Customer Support
D) Contact your Manager
What is Contact your Manager
A username is
A) A type of authentication
B) An identity
C) dependent on a password
D) should be publicly disclosed
What is an identity
The CIA Triad comprises
A) Confidentiality, Integrity, Availability
B) Confidentiality, Integrity, Authenticity
C) Confidentiality, Inheritance, Availability
D) Confidentiality, Inheritance, Authenticity
What is Confidentiality, Integrity, Availability
A privacy attack and concern
A) Shoulder Surfing
B) Denial of Service
C) Client-side Exploit
D) Remote Code Execution
What is Shoulder Surfing
What is freedomains.org
Computer Potentially Compromised? First...
A) Disconnect from Network
B) Contact Your Manager
C) Do Nothing and Allow IT to Detect
D) Access and Save Your Work
What is Disconnect from Network
The most secure Biometric authentication method
A) Face Recognition
B) Iris Scanning
C) Fingerprint Scanning
D) Retina Scan
What is retina scanning
A Denial of Service Attack affects
A) Confidentiality
B) Authenticity
C) Availability
D) Integrity
What is Availability
When wanting to browse while hidden, use...
A) Private Windows
B) Tor
C) Ducky
D) Clear Search History
B) Tor
Browsing the Internet using a public access point
A) Is safe and secure as long as work information is not accessed
B) Safe if a VPN is in use
C) Safe if a password was used to authenticate
D) Should not be used
What is Safe if a VPN is in use