Mobile Device
Security
Home Network
Security
Physical Security Controls
Social
Engineering
100

This name for portable equipment includes laptops, smartphones, tablets, and wearables.

What are Mobile Devices?

100

This modern method of remote communication using a webcam allows people to interact through audio and visual means, eliminating the need for physical presence.

What is a Video Conferencing?

100

I guard the entrance with numbers and codes, Press my buttons in the right mode. With sequence precise, you'll gain access.

What is a Keypad?

100

A fraudulent email pretending to be from your bank and asking for your login information is a classic example of what kind of simple cyberattack, which is by far the most common form of social engineering.

What is Phishing?

200

Make sure you have this feature turned on so that after a period of inactivity the screen is blocked from unwanted use.

What is Auto-lock or Screen-lock?

200

Commonly called as a network name, is a sequence of characters that uniquely names a Wi-Fi network.

What is SSID (Service Set Identifier)?

200

I'm a security measure, simple but profound. No connections allowed, no digital sound. I keep systems apart, ensuring isolation, protecting them from cyber infestation.

What is Air Gap?

200

This “sense” is often manipulated by threat actors in order to have a victim perform an action without fully analyzing the situation.

What is Sense of Urgency?

300

This occurs when an unauthorized person steals, moves or transfers data from a device or network.

What is Data Exfiltration?

300

Most home network devices are pre-configured with _____ administrator passwords to simplify setup.  These _____ credentials are not secure. They may even be physically labelled on the device itself. 

What is default?

300

This traffic control device shares its name with a common electrical component. This device represented by a triangular icon restricts network traffic to a single direction.

What is a data diode?

300

Threat actors attempt to obtain account credentials for this commonly used computer stored messaging system in order to impersonate the victim.

What is an Email?

400

These two features should be disabled on your computer so that any malware on removable media does not automatically spawn its payloads.

What are Autorun and Autostart?

400

This is a common term for annoying and unnecessary software pre-loaded on many computers and phones. If you don’t remove these, your device might feel a bit too full.. like it ate too much at a buffet.

What is Bloatware?

400

These two types of cyber assets represent the most critical digital devices at OPG Nuclear plants and RG sites, requiring extra controls to protect them (Two answers).

What is a CEA (Cyber Essential Asset) and a BES Cyber Asset?

400

This artificial intelligence tool uses an audio sample from a victim to impersonate them.

What is AI Voice Cloning?

500

Attackers will commonly exploit the most vulnerable asset on a network and use this type of movement to get deeper into the network.

What is Lateral Network Movement?

500

Don’t forget to disable this networking feature when not needed, that allows networked devices to play nice and seamlessly discover and establish communication with each other on the network.

What is Universal Plug and Play?

500

I am a technology is built into most network traffic control devices, scanning traffic to detect malicious actors and code, and alerting cyber security.

What is an IDS (Intrusion Detection System)?

500

This term refers to artificial intelligence technology that can create convincing pictures or video hoaxes

What is Deepfake Technology?