General CyberSecurity
Passwords & Authentication
Phishing & Social Engineering
Device & Physical Security
Data Protection & Compliance
100

It stands for a secure connection over the internet.

What is a VPN?

100

This password “123456” is unsafe—even if used on only one site.

What is false?

100

Poor spelling, urgency, and odd attachments are signs of this.

What is a phishing email?

100

This is when a person who follows you into a building.  

What is tailgating?

100

Destroy this before discarding.

What is an old hard drive or USB stick?

200

This is the most common method for stealing credentials.  

 What is phishing?

200

MFA stands for this security measure.  

 What is multi‑factor authentication?

200

Where bad guys manipulate users into giving up sensitive or personal information.   

 

What is social engineering?

200

Keep your phone secure using this method (e.g., PIN, biometrics).

What is smartphone security?

200

This information includes birthday and personal address.

What is personally identifiable information (PII)?

300

You get an unexpected wire‑transfer request from your “CEO”; you should do this.

What is verify via another channel and report to Security?

300

A password that includes punctuation marks, numbers, symbols and a minimum length of 8

What is a strong password?

300

An email from a known or trusted sender in order to induce targeted individuals to reveal confidential information

 What is Spear Phishing? 

300

Going through trash to look for sensitive documents.

What is dumpster diving?

300

The S in this stands for secure and it is found at the beginning of a URL

What is Verify?

400

This type of software protects you from malware and antivirus threats.  

What is antivirus software?

400

Second authentication method that requires the user to use a code sent to a phone or by app.

What is MFA?

400

This form of phishing uses text messages to trick users.

What is smishing?

400

Regular updates do this for your devices to patch vulnerabilities.

What is keep them secure?

400

Always lock this when your workstation is unattended.  

 What are your session or active applications?

500

This term refers to someone who seeks out and exploits weaknesses in computer systems.

What is Hacker?

500

Software application that is used to store and manage passwords

What is a password manager?

500

Someone looking over your shoulder while you are working.

What is shoulder surfing?

500

Encrypting your phone protects this type of data from surveillance.

What is data at rest/transit

500

Failing to comply with security policies can result in this.

What are breaches?

M
e
n
u