Email & Social Engineering
Mobile Devices
Passwords & Authentication
Physical Security & Remote Working
100

Pretending to be something or someone other than yourself.

Spoofing

100

Public Wi-Fi is risky. A hacker on the same network could intercept your data. You should avoid accessing sensitive information, like banking, on public Wi-Fi or use a VPN.

Is using public Wi-Fi safe?

100

What is the terminology used for secure network user habits?

Cyber hygiene

100

What is an example of good network user habits?

What is an example of good network user habits?

200

A nontechnical or low technology confidence trick often involving trickery or fraud.

Social Engineering

200

A strong passcode, PIN, or fingerprint/face unlock prevents unauthorized access to your device, protecting your personal data if it's lost or stolen.

Why should I use a strong passcode or biometric lock?

200

Before a user connects to a network they need to supply what before the connection is allowed?

Valid Credentials

200

What should be done in server rooms to physically protect servers?

Controlled access (Done to prevent theft)

300

Offering something enticing, like a free download, to lure you into clicking a malicious link or downloading malware

Baiting

300

Where is the biometric data for an Android facial recognition lock or fingerprint lock kept?

Only on the Android device

300

For authentication factors what would fall under the category for something you have?

Physical tokens or codes sent via text

300

Network administrators will help secure a network by implementing what on files and folders?

Permissions (falls under access control lists)

400

An attack against a specific individual that utilizes messaging that appeals to that person.

Spear Phishing

400

When you connect your phone to a computer it can be a risk, as malicious software could be transferred to your device.

What can happen when connecting my phone to a computer via USB?

400

If an account is compromised by utilizing this option a hacker can now access multiple systems.

Single Sign On (SSO)

400

By granting either either physical or virtual access to an organization's information system can leave them what?

Vulnerable to exploitation or carelessness.