If using a Windows-based PC, you do this to quickly lock your computer before stepping away
What is press the windows key and the letter l? (Ctrl+alt+del and select "lock this computer" would also be correct.)
100
Web portal used by IP employees to access their personal information, such as pay, benefits, and career development
What is My-IP
100
Email or electronic communications scam targeted towards a specific individual, organization, or business
What is Spear Phishing
100
is a digital currency that uses encryption (cryptography) to generate money and to verify transactions.
What is Cryptocurrency
200
This car is typically considered to be the first “Pony car”
What is “FORD MUSTANG”
200
Something you should do on a regular basis to ensure you can restore your computer to a previous state if something goes wrong
What is backup your computer/data
200
Portal used to reset your personal network password and request additional access
What is Secure IP
200
Phishing attack that is specifically aimed at wealthy, powerful, or prominent individuals
What is Whale Phishing
200
This is one of the most popular decentralized digital currencies available to consumers
What is Bitcoin
(Litecoin and Ethereum are also valid)
300
This is the first Japanese car to be produced in the United States
What is HONDA ACCORD
300
A type of malicious software designed to block access to a computer system until a sum of money is paid
What is Ransomware
300
Program aimed at taking our safety performance to the next level to eliminate life-changing injuries and fatalities in the workplace
What is LIFE
300
Harmful software designed to cause damage or disruption to a computer system
What is Malware
300
____ allows you to store digital currency and create unique 'public addresses' to receive currency
What is a cryptocurrency wallet
400
This was the first commercially available hybrid gasoline-electric car in the United States
What is HONDA INSIGHT
400
Term used to describe the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes
What is Social Engineering
400
Is about building an exceptional engagement culture that takes everyone’s views into consideration
What is My View
400
30% of phishing messages were _____ in 2016
What is the percentage of phishing messages that were opened in 2016
400
Essential resources needed to trade cryptocurrency in the open market
What are cryptocurrency brokers or exchanges
(GDAX, Coinbase, Kraken are also acceptable)
500
This is the year the Corvette was first introduced
What is JUNE 30, 1953
500
The process of using codes to make readable information unreadable.
What is Encryption
500
These are the 4 E’s in the IP leadership model
What are ‘ENGAGED EMPLOYEES EXCEEDING EXPECTATIONS’
500
50% of phishing emails recipients ______ and_____ within the first hour of those messages being sent.
What is the percentage of recipients who open emails and click on phishing links within the first hours of the messages being sent
500
This is the term used to describe when a single cryptocurrency splits in two. It occurs when a cryptocurrency’s existing code is changed, resulting in both an old and new version