Passwords & MFA
Data Disasters
Scammers and Spammers
Security Sentinels
Office Ops and Sneaky Stops
100

This method replaces short passwords with a longer, safer approach.
A: Passphrase
B: Pin
C: Multi-Factor Authentication
D: Long Password

A: Passphrase

100

This label applies to information like SSN or Payroll information:
A: Public
B: Sensitive
C: Confidential
D: All of the Above

C: Confidential
100

This type of email pretends to be urgent to trick you into clicking a link.
A: Memo from Bill
B: Phishing Email
C: Rocket Cyber Alert
D: Monthly News Letter

B: Phishing email

100

This is the first thing you should do when you spot a suspicious system behavior.
A: Ignore it, there's 20 tickets in Triage
B: Report it to the Secure Outcomes Team
C: Tell the user
D: Reboot the system and hope it disappears

B:Report it to the Secure Outcomes Team

100

This policy requires you to lock your workstation when stepping away.
A: Remote Work
B: Clean Desk
C: Acceptable Use
D: Employee NDA

B: Clean Desk

200

This tool safely stores and generates strong passwords.
A: Bitlocker
B: Password Manager
C: Malware Bytes
D: Autotask

B: Password Manager

200

This technique changes sensitive information so only authorized parties can read.
A: Creating multiple subfolders to hide a document
B: Hide and Seek
C: Encryption
D: Phishing

C: Encryption

200

This common scam pretends to come from your boss asking for gift cards.
A: Christmas Party Email Chain
B: Spear Phishing
C: Malware
D: Trick question it's a legitimate email

B: Spear Phishing

200

This team should always be notified of potential breaches.  
A: Secure Outcomes
B: Manchester United
C: Penguins
D: Leadership Team

A: Secure Outcomes Team

200

This term refers to when an attacker looks over your shoulder to view confidential information on your PC.
A: Packet Sniffer
B: Surfing USA
C: Peek A Boo Attack
D: Shoulder Surfing

D: Shoulder Surfing

300

This extra layer of security protects you if your password is compromised:
A: Multi Factor Authentication
B: Passphrase
C: Microsoft Sentential 
D: Physical Layer

A: Multi Factor Authentication

300

You should never store confidential data on these systems.
A: Public Systems
B: Private Systems
C: Approved devices
D: A Locked Filing Cabinet

A: Public Systems

300

This is the best first step when you suspect an email is fake.
A: Click on the link to see if it's safe
B: Reply to the sender and ask if it is legitimate 
C: Forward it to your coworkers
D: Report it to IT/Security

D: Report it to IT/Security

300

This should never be done when you think you clicked something malicious.
A: Ignore it
B: Notify the Secure Outcomes Team
C: Create a See Something Say Something Team
D: All of the Above

A: Ignore it

300

This document dictates the proper actions in the event of a incident.
A: Business Continuity Policy
B: See Something Say Something
C: Incident Response Plan
D: Data Protection Policy

C: Incident Response Plan

400

Reusing this across multiple accounts increases the risk of compromising accounts.
A: The same username
B: The same password
C: The same MFA App
D: The same Computer

B: The same password

400

This principle ensures employees only access what they need for their job.
A: Global Access
B: User Access
C: Admin Access
D: Least Privileged

D: Least Privileged

400

This file type can be used to inject malware into 365 apps just by being previewed in Outlook:
A: RTF
B: JS
C: PDF
D: ZIP

A: RTF

400

Quick reporting helps reduce this critical factor.
A: The number of employees at the company
B: Number of tickets created
C: Damage or impact
D: Reduced Rates

C: Damage or impact

400

This Policy dictates the proper use of Company Assets.
A: Clean Desk Policy
B: Acceptable Use Policy
C: Dress Code Policy
D: Incident Response Policy

B: Acceptable Use Policy

500

When making a password you should never use:
A: All the Below
B: Less than 8 Characters
C: Easily Guessable Information (ie: your dogs name)
D: Letters or numbers in order (ie: 1234, qwerty)

A: All the below
500

After printing documents that contain sensitive information, this follow-up action is required to maintain proper security handling.
A: Shred the documents or store in a locked file cabinet
B: Leave the documents on the printer
C: Store the papers in any nearby drawer
D: Scan and email the documents to yourself 

A: Shred the documents or store in a locked file cabinet

500

After entering your correct credentials into a link you were emailed and receiving an error, you have most likely been:
A: Having a bad day
B: Not turned on Num Lock
C: Reset your password
D: Phished



D: Phished

500

The responsibility of following up on alerts falls to.

A: Secure Outcomes Team
B: Leadership Team
C: Technicians 
D: All of the Above

D: All of the Above

500

Non Company Employees are required to do this when entering the building.
A: Recite the Scout Law
B: Go through the Metal Detector
C: Be pat down
D: Sign in

D: Sign in

M
e
n
u