Fraud
ID Theft
Security Basics
Application
Perimeter
100

This type of fraud involves criminals posing as legitimate institutions to trick individuals into providing sensitive information.  

What is phishing?

100

Name the two-factor authentication methods that enhance the security of online banking?

What are SMS codes and Authenticator apps?  

100

What is the most important element related to evidence in addition to the evidence itself?

What is a Chain of custody document?

100

What is subject to SQL injection attacks?

What is Database Servers?

100

Which security zone can serve as a buffer network between a private secured network and the untrusted internet?

What is DMZ?

200

How can social engineering tactics be used in identity theft, and how can you avoid falling victim to them?

What is manipulating individuals into divulging confidential information, and why should you verify requests for personal information?

200

What precautions should you take when using public Wi-Fi to access your banking accounts?  

What is using a virtual private network (VPN) for added security?

200

What is an important aspect of evidence gathering?

What is Backing up all log files and audit trails?

200

What enters random data to the inputs of an application?

What is Fuzzing?

200

Which remote access authentication protocol allows for the use of smart cards for authentication?

What is EAP?

300

This term refers to the practice of obtaining someone's personal information with the intent to commit fraud.

What is identity theft?

300

How can regularly checking your credit report contribute to identity theft protection?  

What is identifying and addressing any unauthorized or suspicious activity?

300

Which type of cipher changes the position of the characters in a plain text message?

What is Transposition?

300

What is the term for the process of validating a subject's identity?

What is Authentication?

300

What encryption method is used by WPA for wireless networks?

What is TKIP?

400

What precautions should be taken when sharing personal information over the phone to prevent identity theft?

What is confirming the identity of the caller and /or avoiding sharing sensitive information unless necessary?

400

This document, often containing personal details, should be stored securely to prevent identity theft.  

What is your social security card?

400

Which type of malicious activity can be described as numerous unwanted and unsolicited email messages sent to a wide range of victims?

What is Spamming?

400

What is the single best rule to enforce when designing complex passwords?

 What is Longer passwords 

400

What networking devices or services prevents the use of IPSec in most cases?

What is NAT?

500

This type of identity theft involves using someone else's personal information to obtain medical services or prescriptions.

What is medical identity theft?

500

Why is it important to create strong and unique passwords for online banking accounts?  

What is to help prevent unauthorized access?  

500

Which is the cryptography mechanism that hides secret communications within various forms of data?  

What is Steganography?

500

What type of attack is a form of software exploitation that transmits or submits a longer stream of data than the input variable is designed to handle? 

What is Buffer overflow?

500

What is modified in the most common form of spoofing on a typical IP packet?

What is a source address?

M
e
n
u