Tech
Terms
Email
Errors
Password
Pitfalls
Careful What You
Click For
Insider
Threats
100

What is the practice of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information? HINT: It's in the name of the game

Cybersecurity

100

What is the most important thing you should do when you receive an email that feels suspicious? 

Report it

100

What is the most commonly used password? HINT: you can count on someone using it. 

123456

100

What are used by some websites to track your browsing history and target you with personalized ads? HINT: you can't eat them!

Cookies

100

What should you always do when you have to get up from your desk and leave your computer unattended? 

Lock your computer

200

What is a common type of social engineering attack where an attacker impersonates a trusted individual or organization to trick a target into revealing sensitive information, often via a fake email? 

Phishing

200
TRUE OR FALSE: Deleting a suspicious email is safer than reporting it. 

FALSE 

200

What should you never do with your passwords?

Share them with anyone or write them down 

200

TRUE OR FALSE: Incognito mode or private browsing mode can help you avoid cookies. 

TRUE

200

A coworker says they need your information to log in as you "just for a minute" while you're not there. How should you respond? 

Say no and tell your manager. 

300

What security measure verifies the identity of a user by combining two or more different authentication factors?

Two-factor authentication

300

What are the red flags in this email snippet:

"From: J@cob Phish3r <jphish@legit-gov-services.com>
Sent: Monday, September 16, 2024 9:55 AM"

Sender's name and email address

300

What should you do if you suspect your password has been compromised?

Change it immediately 

300

What is a common label used to indicate a sponsored link or advertisement on a search engine or website?

"Sponsored" or "Ad"

300

You write your password down on a post-it note and leave it at your desk, allowing anyone to see it. Does this make you negligent or a malicious insider threat?

Negligent

400

What is the term for unwanted and unsolicited junk mail sent in bulk? 

Spam

400

What should you never do with an email that seems suspicious?

Click on any links or attachments 

400

Where is the most secure place to store your passwords?

In a password manager (not written down at your desk)

400

What is an effective way to see the true destination of a suspicious link?

Hover your mouse over the link

400

Your coworker asks you to cover up an unauthorized action they performed. This would make your coworker a malicious insider. What should you do? 

Don't cover it up and tell your manager

500

The biggest security vulnerability in any organization is its own ___________.

Employees

500

What are the red flags in this email snippet:

"URGENT! You must act now in order to prevent your account from being terminated!"

Threats & urgent language 

500

DAILY DOUBLE!

Which of these passwords is the strongest?

A) ILoveMyWife!1234, 

B) F00tb@11Be@g1e, 

C) CheeseburgerTruckLoverForever2024

B) F00tb@11Be@g1e

500

What type of malicious content can be hidden in ads or sponsored links?

Malware, phishing scams, or fake products

500

A vendor requests access to the company's system without IT's knowledge. What should you do? 

Deny their request and redirect them to the IT department

M
e
n
u