Before leaving your device/ desktop at work, what should you always do?
What is 'locking your computer?'
Before leaving your device/ desktop at work, what should you always do?
What is 'locking your computer?'
T/F: Passwords must be a mixture of letters, numbers, and symbols with a length of at least 8 to around 12 characters.
What is 'false; passwords should be 8 to 15 characters in length?'
MSSND stands for __________.
What is 'Minimum Security Standards for Network Devices?'
You receive a phone call from an antivirus company. After visiting a site, you immediately receive a pop- up message alerting you that you received a virus and that you need to download the anti-virus software immediately. Do you do it?
What is 'no?'
Personal devices accessing systems with legally protected information should have...
What is an 'encrypted hard drive?'
T/F: PL2 examples are financial information, medical information, and social security number.
What is 'true?'
T/F: The three ways Calnet 2- Step Authentication can alert your device of attempted access are ______, ______, and ______.
What are 'send me a push, call me, and enter a passcode?'
A police officer calls to ask for sensitive information on a student. You decline their request.
What is 'do not give any sensitive information on the student because of FERPA?'
The firewall on your computer should always be on to limit connections of...
What are 'IP addresses and ports?'
T/F: If you are working remotely on a personal device at home, you do not need to follow MSSND?
What is 'false?'
T/F: Three MSSND requirements are _______, _______, and ______ (there are 9 possible right answers).
What is...
No unencrypted authentication
No unattended console sessions (Lockout policy)
Software patch updates
Antivirus program
Use of authentication
Firewall
Passphrase complexity
Privileged accounts
No unnecessary services
Your computer has been compromised and you have immediately taken it off the network after remembering the training your received from your awesome InfoSec training. This is the next step.
What is 'changing your passwords on another trusted machine?'
Malware that encrypts documents and and other potentially mission critical content on computers, network shares, or entire computing environments often for money is called...
What is 'ransomware?'
T/F: According to the MSSND rule about software patch updates, software should be no more than 3 updates behind.
What is 'false?'
T/F: Anti-malware software works to _______,________, and ________.
What are 'block, detect, remove?'
You receive an email from you bank asking you to confirm some information. The email includes a link that seems to be the correct link to your bank. You do these things before clicking the link.
What is 'hovering over the link to check the hyperlink, checking the “from” email, and calling your bank?'
A standard security protocol for establishing encrypted links between a web server and a browser in an online communication is...
What is 'SSL (secure socket layer)?'
Port 443's protocol is HTTPS, which is used for authenticated network sessions.
What is 'true?'
The CIA triad stands for ______, ______, and ______.
What is 'confidentiality, integrity, and availability?'