Building Strong Foundations
Don't Take the Bait
Device Smarts
Small Choices, Big Impact
Cyber Habits That Protect You
100

What's the name of something you or a computer can catch?

Virus or a Phish

100

Secure websites will begin with what combo of characters?

HTTPS://

100

This is a word or string of characters that is used to prove identity to gain access to a resource.

Password.

100

This is what the acronym "VPN" stands for in the context of Cybersecurity.

Virtual Private Network.

100

True/False: Using the same passwords on different sites is ok as long as they are strong passwords.

False: Never use the same passwords for different accounts.

200

True/False: It's a good idea to turn on automatic software updates to protect your device.

True

200

This is the term for Voice Phishing, a conjunction of the two words which involves phone calls where attackers pretend to be someone they're not in order to trick their target.

Vishing.

200

Name 3 types of biometrics to verify an identity.

Acceptable answers:
Eye (Iris)
Fingerprint
Face
Voice
DNA

200

How do you report a suspicious email?

1. Report Phishing button

2. Forward As Attachment to nospam@partners.org

3. Report to the Service Desk

200

True/False: It is ok to share passwords with new employees who don’t have access yet.

False: It is never okay to share passwords with anyone.

300

True/False: I don’t need to worry about virus protection on my gaming systems or web-enabled devices.

False: Viruses can infect any devices that are connected to the Internet.

300

True/False: Caller ID can be spoofed to display a trusted name or number, making it unreliable.

True.

300

What is the name of our security tool for mobile phones and tablets?

Intune.

300

If you are a victim of identity theft what should you do?

  • Contact the FTC

  • Monitor your credit reports

  • Contact your bank

300

What is it called when you store other copies of your data in a different location than the original?

Backups

400

This is a security tool that protects your account by requiring a password AND an additional element for login.

Multi-Factor Authentication (MFA).
400

What is it called when a person pretends to be calling from the “IRS” and threatens to send you to jail?

Tax scam

400

True/False: It's safe to leave apps you don't use anymore out of the latest version.

False: You should try to keep all software up to date, and better yet, remove unused apps entirely.

400

We recently rolled out a new policy requiring the use of an MFA application called this.

Okta Verify

400

This is a policy where no one is trusted by default from inside or outside of the network. Verification is required from everyone gaining access to the environment.

A "zero trust policy."
M
e
n
u