Secure IT
Protect IT
Make IT Private
Hooked on IT
Socialize IT
100

The current preferred method of authentication

A) Username/Password

B) Digital PIN

C) PIV

D) Security Questionairre

What is PIV

100

When leaving your computer for a short time and coming back

A) Lock it

B) Log off of it

C) Restart it

D) Shut it down

What is Lock it
100

Social Security Numbers, Drivers License Numbers, Bank Accounts, Home Addresses

A) Public Information

B) Confidential Information

C) Personally Identifiable Information

D) Secret Information

What is Personally Identifiable Information

100

Suspected phishing emails should

A) Be Deleted

B) Be Reported

C) Left Alone

D) Replied To

What is Be Reported

100

Lost Your Device? First...

A) Tell No One

B) Contact the Police

C) Contact Customer Support

D) Contact your Manager

What is Contact Customer Support

200

Combination of Authentication Methods

A) Multi-Factor Authentication

B) Secure Authentication Management

C) Defense-in-Depth Authentication

D) Biometric Authentication

What is Multi-Factor Authentication

200

Responsible party for ensuring data security

A) IT Staff

B) Cyber Security Operations

C) All employees

D) Privacy Office

What are All Employees

200

Unauthorized release of personal information

A) Data Breach

B) Information Compromise

C) Contained Incident

D) Information Hack

What is Data Breach

200

Phishing Attack with Specific Targets

A) Vishing

B) Spear Phishing

C) Target Phishing

D) Shark Phishing

What is Spear Phishing

200

Suspicious Email?

A) Delete It

B) Report It

C) Reply to It

D) Contact Customer Support

What is Report It

300

Biometric Authentication is

A) Something you are

B) Something you know

C) Something you have

D) Somewhere you are

What is something you are

300

The biggest security liability in an organization

A) Employees

B) Insecure configuration of systems

C) Faulty software

D) Public perception/popularity

What are Employees

300

Organization Lead on Determining Training and Policy related to Privacy


A) Senior Privacy Specialist

B) Chief Privacy Officer

C) Chief Information Officer

D) Inspector General

Who is Chief Privacy Officer

300

Phishing Attack Targeting Executives

A) Spear Phishing

B) Shark Phishing

C) Whaling

D) Vishing

What is Whaling

300

Breach of Personal Privacy?

A) Tell No One

B) Contact the Police

C) Contact Customer Support

D) Contact your Manager

What is Contact your Manager

400

A username is

A) A type of authentication

B) An identity

C) dependent on a password

D) should be publicly disclosed

What is an identity

400

The CIA Triad comprises

A) Confidentiality, Integrity, Availability

B) Confidentiality, Integrity, Authenticity

C) Confidentiality, Inheritance, Availability

D) Confidentiality, Inheritance, Authenticity

What is Confidentiality, Integrity, Availability

400

A privacy attack and concern

A) Shoulder Surfing

B) Denial of Service

C) Client-side Exploit

D) Remote Code Execution

What is Shoulder Surfing

400

Computer Potentially Compromised? First...

A) Disconnect from Network

B) Contact Your Manager

C) Do Nothing and Allow IT to Detect

D) Access and Save Your Work

What is Disconnect from Network

500

The most secure Biometric authentication method

A) Face Recognition

B) Iris Scanning

C) Fingerprint Scanning

D) Retina Scan

What is retina scanning

500

A Denial of Service Attack affects

A) Confidentiality

B) Authenticity

C) Availability

D) Integrity 

What is Availability

500

When wanting to browse while hidden, use...

A) Private Windows

B) Tor

C) Ducky

D) Clear Search History

B) Tor

500

Browsing the Internet using a public access point

A) Is safe and secure as long as work information is not accessed

B) Safe if a VPN is in use

C) Safe if a password was used to authenticate

D) Should not be used

What is Safe if a VPN is in use