Computer Criminals
Leading Threats
Security Practices
Information Classification
Best Practices :)
100

An email claiming your bank account is compromised, and they want your personal information and, most likely your identity, by directing you to a fake website, is an example of ____.

What is Phishing?

100

Like a leech, a ____ attaches itself to another program, file, or disk.

What is COVID?

100

____ uses multiple layers of defense to address technical, personnel, and operational practices.

What is defense in depth?

100

Clinical protocols, payroll information and unpublished market research are all examples of ____ information.

What is highly restricted?

100

____ is what should do when you are finished with work on your laptop for an extended period of time.

What is shutting down your laptop?

200

____ may only be 20% of the threat, but they produce 80% of the damage.

What are Insiders?

200

Your grandma sends you a random link to follow over FB Messenger, but actually it’s a ____.

What is a worm?

200

___ should be kept private, secret, easily remembered and changed regularly.

What are passwords?

200

___ information that, if disclosed to unauthorized individuals, could have a moderate impact on VitalTrax’s business interests including competitiveness, goodwill, or ability to meet legal or regulatory requirements.

What is confidential?

200

When you are in ____, you should never leave your laptop unattended.

What are public spaces?

300

____ create tools for hacking and often hack computers for no criminal reason.

What are hacking groups?

300

This type of program can often be used for legitimate reasons, but don’t pay the fee and it may malfunction.

What is a logic bomb?

300

___ carefully analyze incoming traffic based on pre-established rules and filter traffic coming from unsecured or suspicious sources to prevent attacks.

What are firewalls?

300

Press releases are no risk to the company as these are ____.

What is public information?

300

By not opening email attachments unless you are expecting the email with the attachment and you trust the sender, you will avoid _____.

What is social engineering?

400

"Buy this time-share" is a clever example of how _____ cheat others out of something valuable.

What are scammers?

400

Have you ever received hundreds of ad popups over and over and can’t make it stop..this may be caused by ____.

What is adware?

400

___ details the process for handling confirmed security incidents.

What is SOP 105 – Issue Management?

400

Information that is intended for public disclosure is ______.

What is unclassified?

400

Looking for https or the lock symbol near the url, ensures you are using _____.

What is secure browsing?

500

____ wants to be a hacker but lacks any serious technical expertise.

What are script kiddies?

500

____ is when an attacker pretends to be your final destination, but it’s only a premonition.

What is man in the middle attack?

500

___ is one of the most persistent threats on the internet today.

What is fake antivirus software?

500

The correct order from most to least damaging content if it was given to an unauthorized person is ___.

What is highly restricted, restricted, confidential and unclassified/public?

500

You should call the recipient of highly restricted or restricted content when ____ them the documents.

What is faxing?

M
e
n
u