Standards/Frameworks
Acronyms
Concepts
GMF
Random
100

NIST CSF Mandatory?

False. NIST CSF is voluntary.

100

AAA

Authentication, Authorization, Accounting

100

This security model assumes no user or device is automatically trusted, even if it is inside the network.

Zero Trust

100

GMF was formerly known as..

Americredit

100

 What does “HTTP” stand for?

HyperText Transfer Protocol

200

Most well-known framework for implementing, maintaining, and managing your ISMS

ISO 27001

200

EDR

Endpoint Detection and Response


200

This type of social engineering attack uses text messages to trick victims into clicking malicious links or revealing personal information.

SMShing

200

This program encourages GMF employees to engage in wellness activities

Shift to Wellness

200

This athlete was the Super Bowl 2026 MVP

Kenneth Walker III

300

NIST functions

Identify

Protect

Detect

Respond

Recover

Govern

300

CVE

Common Vulnerabilities and Exposures

300

This type of malware disguises itself as legitimate software to trick users into installing it, then performs malicious actions.

Trojan Horse

300

Which strategic priority? Co-develop valuable solutions that go beyond the vehicle to deepen our relationship with customers 

Partner with GM

300

What country does the island of Tasmania belong to?

Australia

400

A standard awareness document that highlights the most critical security risks to web applications.

OWASP Top Ten

400
XSS

Cross-Site Scripting

400

This term refers to hardware, software, or cloud services used by employees without approval from the IT department.

Shadow IT

400

We have offices in these Latin American Countries:

Brazil
Chile

Mexico

Colombia 

Peru

400

What year did World War II end?

1945

500

This CSF 2.0 feature helps organizations describe their current and desired cybersecurity outcomes without referencing specific tools or controls.

Profile

500

MTTD

Mean Time to Detect


500

This type of malicious software secretly records keystrokes to capture passwords and sensitive information.

Key logger

500

This is GMF's global approach to giving feedback

Compassionate Candor

500

What programming language was originally called “Oak”?

Java