If you have a business need to send sensitive business information or personal information to an outside party over email, how should you do it?
A) Encrypt the information using the 'Send Secure' button in Outlook
B) Send the information in an attachment
C) Compress the information before sending it
D) None of the above
A) Encrypt the information using the 'Send Secure' button in Outlook
What is it called when a malicious actor tries to get information or commit fraud over the phone?
A) Vishing
B) Smishing
C) Fishing
D) Frauding
A) Vishing
What is malware?
A) A type of hardware
B) Malicious software designed to harm your computer
C) A type of software that speeds up your computer
D) A method for securely deleting files
B) Malicious software designed to harm your computer
Criminals access someone's computer and encrypt that person's files and data. The criminals demand payment in exchange for decrypting the files and data. This practice is called...
A) Botnet
B) Ransomware
C) Driving
D) Spam
B) Ransomware
What is the primary purpose of a firewall?
A) To monitor your computer's performance
B) To block unauthorized access
C) To speed up your internet connection
D) To store data
B) To block unauthorized access
If you get a suspicious phone call at work from someone claiming that your computer has a virus, you should:
A) Stay on the line and give the person the information they are requesting
B) Allow the representative to remote into your computer to assist you
C) Hang up and contact the SOC
D) Only provide them with your name and operating system
C) Hang up and contact the SOC
How can we tell that an email was sent from outside of TJX?
A) The message contains a red flag
B) The email address of the sender appears in red
C) The body of the email has a banner saying it has come from an external sender, and the subject line has an "[External]" tag
C) The body of the email has a banner saying it has come from an external sender, and the subject line has an "[External]" tag
What is the best way to create a strong and unique password?
A) Vary your passwords from application to application
B) Don't use words that are easy to guess (e.g. your street address, your child's name)
C) Add a mix of uppercase and lowercase letters, numbers, and symbols
D) All of the above
D) All of the above
What should you do if you think your TJX account has been compromised?
A) Monitor your email address and accounts for fradulent activity
B) Respond to the warning email you have received
C) Shut down your device
D) Contact the SOC and your manager immediately
D) Contact the SOC and your manager immediately
What is social engineering in the context of cybersecurity?
A) Designing secure software
B) Building physical security systems
C) Developing encryption algorithms
D) Manipulating people into divulging confidential information
D) Manipulating people into divulging confidential information
In the context of cybersecurity, what does the acronym APT stand for?
A) Advanced Persistent Threat
B) Automated Penetration Test
C) Active Protection Technology
D) Application Penetration Testing
A) Advanced Persistent Threat
What is the main function of a sandbox in cybersecurity?
A) Isolating and analyzing suspicious files
B) Encrypting data
C) Monitoring network traffic
D) Managing user access
A) Isolating and analyzing suspicious files
What is the difference between symmetric and asymmetric encryption?
A) Symmetric uses one key, asymmetric uses two keys
B) Symmetric uses two keys, asymmetric uses one key
C) Symmetric is slower, asymmetric is faster
D) Symmetric is more secure than asymmetric
A) Symmetric uses one key, asymmetric uses two keys
What does the term "zero-day exploit" refer to?
A) A vulnerability that is exploited before the software developer has released a fix
B) An attack that occurs on the first day of the month
C) A type of malware that activates on a specific date
D) A security patch that is released immediately
A) A vulnerability that is exploited before the software developer has released a fix
What does the acronym VPN stand for, and what is its primary use?
A) Virtual Private Network; secure internet connection
B) Virtual Public Network; data encryption
C) Virtual Protected Network; malware protection
D) Virtual Personal Network; user authentication
A) Virtual Private Network; secure internet connection
Because you have antivirus software installed on your computer, you don’t have to worry about a virus attack on your computer.
A) True
B) False
B) False
Which framework does TJX use to guide its cybersecurity practices?
A) ISO/IEC 27001
B) NIST Cybersecurity Framework
C) COBIT
D) ITIL
B) NIST Cybersecurity Framework
What is one of the primary functions of TJX’s Security Operations Center?
A) Data encryption
B) Threat detection and incident response
C) User authentication
D) Network monitoring
B) Threat detection and incident response
What is the primary purpose of a honeypot in cybersecurity?
A) To speed up network traffic
B) To store sensitive data securely
C) To attract and trap potential attackers
D) To encrypt communications
C) To attract and trap potential attackers
When using Multi-Factor Authentication, each piece of evidence must come from a different category: something you know, something you have or something you ____.
A) Want
B) See
C) Need
D) Are
D) Are
What is the primary purpose of a Security Information and Event Management (SIEM) system?
A) Encrypting data
B) Managing user access
C) Conducting penetration tests
D) Collecting and analyzing security logs
D) Collecting and analyzing security logs
Which protocol is commonly used for secure file transfer over the internet?
A) FTP
B) HTTP
C) SFTP
D) SMTP
C) SFTP (SSH File Transfer Protocol)
Which type of attack involves an attacker intercepting and altering communications between two parties without their knowledge?
A) Phishing
B) Man-in-the-Middle (MitM)
C) SQL Injection
D) Denial of Service (DoS)
B) Man-in-the-Middle (MitM)
What is the primary goal of a blue team in cybersecurity?
A) To simulate attacks and identify vulnerabilities
B) To monitor network traffic
C) To defend against cyber attacks and improve security posture
D) To manage user access
C) To defend against cyber attacks and improve security posture
What is the primary goal of a red team in cybersecurity?
A) To defend against cyber attacks
B) To monitor network traffic
C) To manage user access
D) To simulate attacks and identify vulnerabilities
D) To simulate attacks and identify vulnerabilities