Incident Response
Password Secuirty
Mobile Device Security
Social Engineering
SCADA/ ICS Systems
100

This is the first action you should take when you receive a suspicious email at work.

What is report it to IT/security?

100

This attack method involves an attacker trying thousands or millions of combinations until the correct password is found.

What is a brute force attack?

100

Failing to update your phone, using public Wi-Fi, or installing apps from unofficial sources can make your device vulnerable to this.

What are computer viruses/ malicious code?

100

This is the most common form of social engineering delivered through email.

What is SPAM?

100

These systems control industrial processes like power plants and water treatment.

  • What are SCADA (Supervisory Control and Data Acquisition) systems?
200

Plugging in your personal mobile phone into your government computer is classified as what type of incident.

What is unauthorized USB?

200

This technology replaces passwords with a code sent to your phone or email.

What is multi-factor authentication (MFA)?

200

200 – Connecting to public Wi-Fi without a VPN can expose you to this type of cyber attack

What is data interception / man-in-the-middle attack?

200

This occurs when someone follows an authorized person into a secure area without scanning their badge.

What is tailgating or piggybacking?

200

SCADA systems are vulnerable if they are connected to this.

What is the internet or an unsecured network?

300

This official document provides step-by-step guidance for handling cybersecurity incidents.

What is an Incident Response Plan (IRP)?

300

This tool can be used to securely store and retain complex passwords.

What is a password manager?

300

This feature allows you to erase all data remotely if your phone is compromised.

What is remote wipe?

300

This technique involves an attacker creating a false scenario to trick someone into giving up information.

What is Spoofing?

300

These specialized devices in ICS/SCADA collect data from sensors in the field.

What are remote terminal units (RTUs) or programmable logic controllers (PLCs)?

400

This type of exercise simulates a cyber event to test how well a team would respond.

What is a tabletop exercise?

400

This access control method limits user permissions based on job responsibilities.

What is Role-Based Access Control (RBAC)?

400

Software that is secretly or surreptitiously installed into an information system to gather information on individuals or organizations without their knowledge, a type of malicious code.

What is spyware?

400

This type of attack involves a criminal posing as a senior leader or vendor to trick employees into sending money or data.

What is a Whaling?

400

The process of identifying critical Mission control systems is known as what?

What is Mission Decomposition?

M
e
n
u