Social engineering is not about hacking software, it's about hacking …
What are humans?
If you suspect an email is phishing don't __________.
What is click link?
How many questions must you answer before resetting your forgotten Trend password?
What is at least 2?
A security practice and a feature used to prevent unauthorized access to a computer or mobile device when left unattended. It’s normally set in GPO to activate when there is no activity in the computer?
What is the Lock Screen?
Malware that prevents users from accessing their system or files until money is paid?
What is Ransomware?
Someone trying to hack you is more likely to pose as your ______ than your direct report?
What is a boss?
An unusual ______ is a possible sign the email is phishing?
What is the sender?
Crossing a door without a badge by walking close to the victim without his knowledge?
What is tailgating?
TrendMicro information that has economic value to the Company is classified as?
What is Top Secret?
Ransomware family based on encrypting files until users pay the ransom in exchange for the decrypt key?
What is Crypto-ransomware?
Social engineering is usually trying to extract from you _______ information?
What is sensitive?
Do it now! A sense of ______ is a typical tactic in phishing?
What is urgency?
Crossing a door without a badge by walking close to the victim, WITH his knowledge?
What is piggybacking?
This is any data that could potentially identify a specific individual?
What is Personally Identifiable Information (PII)?
This Trend Micro tool can decrypt files locked by certain crypto-ransomware variants without paying the ransom?
What is Trend Micro Crypto-ransomware File Decryptor?
Because I say so! Faking _______ is a typical tactic in social engineering?
What is an authority?
Instagram ___ can also contain phishing links?
What is DMs?
Only 5 coupons left!! Perceived _____ creates demand and promotes action. Beware.
What is scarcity?
This computed value ensures a user the file they downloaded has not been modified?
What is Hash?
The numbers-only name of a backup strategy where a user will create 3 backup copies on 2 different media with 1 backup in a separate location?
What is 3-2-1 Rule?
A fake site that looks official and just waits, expecting users to find it through engines is known as a...
What is a watering hole?
If you need to forward a spear phish email to infosec use this address?
What is 911@trendmicro.com?
USB _____ involves passing out free USB sticks with malware, or "forgetting them" in public places?
What is baiting?
This is the process of decreasing or eliminating a remnant magnetic field. Use to destroy data on magnetic storage?
What is Degaussing?
The WannaCry ransomware was released by this hacker group?
What is The Shadow Brokers?