Cybersecurity 101
Physical Security
Global Trade Compliance
Security Scenarios
Policies, Protocols, Procedures
100

Method of logging in that requires more than just a password.

Multi-Factor Authentication


100

You should always wear this while on site to identify yourself.

company issued ID Badge


100

Exporting controlled technology to a foreign person in the U.S. is known as this.

Deemed Export

100

You receive a USB drive from an unknown source. What do you do?

Report it, DO NOT plug it in

100

Company security and Compliance policies are found where?

The employee handbook.

200

Something you should never share with coworkers, even if they ask nicely.

Password

200

Visitors must always do this when entering a business unit.

Sign in

200

The government agency that enforces the EAR.

Bureau of Industry and Security (BIS)

200

You see someone in the office without a badge. What's your next step?

Report them to security

200

How often must employees complete mandatory security training?

Annually

300

Emails that trick users into clicking malicious links.

Phishing


300

Propping this open can be a serious security violation.

Access-controlled door

300

A list used to screen international partners and customers.

Denied/Restricted Party List


300

You notice sensitive documents left on a shared printer. What should you do?

Secure/Shred them and inform the owner

300

You must do this before sharing controlled technical data with a foreign national.

Obtain licensing and approval.

400

This type of software is used to protect against unauthorized access.

Firewall


400

These devices record who enters and exits secure areas.

Access control systems or badge readers

400

The ITAR regulates exports related to this industry.

Defense Industry

400

Term describing someone withing the organization that poses a risk.

Insider Threat

400

This process evaluates whether a transaction involves high risk entities.

Restricted Party Screening

500

Practice that involves identifying and patching system weaknesses.

Vulnerability Management

500

The correct response when you see someone tailgating through a secure door.

Report the Incident 

500

Agreement type allowing U.S. companies to provide defense services to foreign persons.

Technical Assistance Agreement (TAA)


500

The first thing you should do in a suspected data breach.

Report to IT security or your supervisor.

500

This policy defines what internet usage is allowed on company devices.

Acceptable Use Policy

M
e
n
u