General
Metrics
Automation
Information Security
100

What is the acronym and full form of our team name on Microsoft teams ?

MAT (Metrics and Automation Team)

100

What does GISMR stand for ?

Global Information Security Metrics Report

100

What does IDP Stand for ?

Information Delivery Platform

100

What is the first and last name of BMO's CISO ?

Sri Dronamraju

200

To what email address are you supposed to report suspicious emails sent to your  BMO email?

 IsIt.Safe@bmo.com

200

what does CISMP stand for ?

Centralized Information Security Metrics Program

200

What is the mean and standard deviation of a standard normal distributed data ?

mean = 0

standard deviation = 1

200

The word “malware” is actually a combination of two words.  What are those two words ?

Malicious and software

300

What is the telephone version of phishing called ?

Vishing

300

What does OCC Stand for ?

Office of the Comptroller of the Currency

300

A certain couple tells you that they have two children, at least one of which is girl. What is the probability that they have two girls ?

1/3

300

To help keep customers safe, BMO offers services and software that protect customer identity and information. what is the name of the  service provided by BMO to monitor suspicious customer activity that might be fraudulent.

OnGuard identity theft service

400

What is the term for the practice of following someone into an office without using a pass ?

Piggybacking or Tailgating

400

To ensure that the appropriate security due diligence activities have been completed prior to implementation, what checklist should be opened at the start of the project, completed over the duration of the project, and approved prior to implementation ?

Security Pre-Implementation Review (SPIR) Checklist

400

What will be the out put for following code in the SAS Programming

x=1, y=3, z= .

SAS Code

A= sum(x,y,z)

B=x+y+z


A=? , B=?

A= 4

B= .

400

Some social engineers create a scenario to engage a targeted victim that increases the chance the victim will provide them with information.  Such as posing as a person of authority, like a security officer. What is this called ?

Pretexting

500

Social engineers have been known to leave a malware-infected USB key in a bathroom, elevator or public place with an official looking logo on it, all in the hopes the victim will load it onto their computer.  What type of social engineering tactic is this ?

Baiting

500

Book of record(BoR) for all IS process maps and Standard Operating Procedures (SOPs) housed within which application ?

Enterprise Nimbus

500

What is sum of 1 to 100 ?

n*(n+1)/2 i.e. 5050

500

What is the name for the spyware that collects the information that you type into your computer ?

Keyloggers or Keystroke logger

M
e
n
u