Phishing
Malware
Authentication
Application Security
Physical Security
100

This is the goal of credential harvesting emails. 

What is to get credentials/passwords?

100
This type of malware locks your files and demands payment.

What is ransomware?

100

This is the most common form of authentication. 

What is a password?

100

This principle states that users should only have the access they need to complete essential job functions.

What is least privilege?

100

This simple action should be done every time you leave your workstation. 

What is lock it/lock your computer?

200

This type of phishing involves phone calls rather than emails. 

What is vishing?

200

This type of malware disguises itself as legitimate software to remain undetected. 

What is a trojan?

200

Adding an additional requirement to authenticate yourself is known as this.

What is 2FA?

200

This common vulnerability occurs when user input is not properly sanitized.

What is SQL Injection?

200

These physical security tools record video of areas requiring protection. 

What is a security camera/CCTV.

300

This type of phishing targets a specific executive or high level user. 

What is whaling?

300

This type of malware detects and collects keystrokes on the compromised machine. 

What is a keylogger?

300

What newly created internal document should everyone review to understand password requirements?

What is The Inspectron Password Policy?
300

This security strategy involves a multi layered approach, so that if one layer fails there is another layer to get through. 

What is defense in depth?

300

This seemingly innocent act involves holding open the door for someone when entering a secure area. 

What is tailgating?

400

This attack prays on human emotions and attempts to manipulate users. 

What is social engineering?

400

This type of malware spreads and replicates itself without user interaction.

What is a worm?

400

Authentication using your face or thumbprint is an example of this. 

What is biometrics or biometric authentication?

400

This development practice integrates security into every step of the software development lifecycle. 

What is DevSecOps?

400

This radio wave based technology is responsible for allowing most keycards to function, among many other purposes. 

What is RFID, or radio frequency identification. 

500

This tactic involves attackers using domains that look similar to real ones to trick users. 

What is typosquatting?

500

This seven stage process explains how the typical malware attack progresses. 

What is the cyber kill chain?

500

What are the three categories of authentication methods?

What is knowledge, possession, and inherence. Or something you know, something you have, and something you are.

500

This yearly list of the ten most critical web application security risks is a valuable resource for developers. 

What is OWASP Top 10?

500

This often overlooked aspect of building ambiance is actually a key piece physical security controls. 

What is lighting? 

M
e
n
u