Actions
Devices
Policies and Governance
Social
Name Game
100

Always ______ your computer when you step away.

What is lock?

100

The two most popular operating systems for smartphones.

What are Android and iOS?

100

Minimum character recommendation for your passwords.

What is 16 characters?

100

Still the most popular social media service in the world.

What is Facebook?

100

The INL phone number to call with cybersecurity questions.

What is (208) 526-1000?

200

Scammers ask for payment via one of these methods because they are very difficult to trace and recover. (name any one)

What are payment apps, gift cards, cryptocurrency or wire transfers?

200

This physical part of your laptop should be covered when not in use- just in case someone is watching.

What is the webcam?

200

This is INL's VPN and network security tool.

What is Zscaler

200

These social media settings should be set to your comfort level and checked regularly, like at least once a year.

What are privacy settings?

200

A network security system named after a metal partition between a car's engine and passengers, it monitors and controls incoming and outgoing network traffic based on predetermined security rules.

What is a firewall?

300

The first action to take if you accidentally click on a real phishing email at INL.

What is immediately call the Service Desk?

300

This type of service is used to create a secure connection over a less secure network, often used in remote work scenarios.

What is a VPN (Virtual Private Network)?

300

This software should have the strongest passphrase you can create, since it stores many other very sensitive pieces of information.

What is your password manager?

300

The practice of attempting to trick individuals into revealing confidential information via social interactions.

What is social engineering?

300

A shorter name for malicious software. It’s a combination of parts of two different words.

What is malware?

400

A good method to check if a suspicious message from a co-worker is legitimate.

What is call them or contact them via another communication method?

400

When you buy a new router, this password should be changed before the WiFi password.

What is the admin password?

400

The Artificial Intelligence system (AI), whose low cost caused a temporary panic among U.S. AI companies, is prohibited on INL computers to maintain information security standards.

What is DeepSeek?

400

This type of phishing attack targets specific individuals or organizations with personalized messages

What is spear phishing?

400

The second most popular social media service in the world.

What is Youtube?

500

You should do this before using a USB drive someone found “just lying around” 

What is turn it in or don't use it?

500

The type of software which is embedded into hardware to help the hardware function

What is firmware?

500

On June 7, 2021, the Department of Justice announced that it had seized approximately $2.3 million worth of this cryptocurrency from hackers.

What is Bitcoin?

500

Pretending to be someone they are not online to gain information is called this.  

What is pretexting?

500

A global ransomware attack on Windows computers that occurred in May 2017 came from a virus with this "tearful" name.

What is WannaCry?