Call the Exterminator
You've Got Mail
Can't Touch This
To Catch a Thief
What Does That Mean
100
When an imposter obtains key pieces of personally identifiable information, in order to impersonate someone else.
What is identity theft?
100
Scams distributed through email such as phishing, pharming, and impersonation.
What is Social Engineering?
100
The acronym DDoS stands for when a server or website is bombarded with so many requests for data that it crashes.
What is a Distributed Denial of Service?
100
Another name for Crackers -- malicious hackers who infiltrate secure systems to steal information.
What is Black Hats?
100
The best way to protect your information when you are away from your computer.
What is Lock the computer with a password?
200
Malicious code that makes copies of itself and spreads without human interaction.
What is a computer worm?
200
The Acronym of URL stands for
What is Uniform Resource Locator?
200
Another name for a zombie computer army
what is a Botnet?
200
A filter for an internet connection.
What is a Firewall?
200
Process of encoding information in a way only someone with a key can decode it.
What is encryption?
300
Criminal activities carried out by means of computers or the internet.
What is Cyber crime?
300
The acronym SSL - a form of public key encryption, stands for.
What is a Secure Sockets Layer?
300
A computer program that detects viruses and repairs files.
What is anti-virus?
300
"Remember Me" functions in web browsers or other applications are unsafe and should be avoided.
What is True?
300
Unwanted repetitious messages, such as unsolicited bulk email is known as.
What is Spam?
400
A damaging consequence if you disclose inappropriate or personal information on a fake website.
What is identity theft?
400
More than 4000 attacks happen per day. Damages are to reach 5 billion dollars this year. 88% of the attacks are through email. These attacks encrypt your data and hold it hostage.
What is Ransomware?
400
1. you get a ransom message 2. you get a fake anti-virus message 3. your browser has unwanted toolbars 4. internet searches are redirected to unexpected sites. 5. friends receive social media invitations you didn't send.
What are signs that you've have been hacked?
400
The ancronym of IoT stands for
What is the internet of Things?
400
The product/software that we use to encrypt emails.
What is Proofpoint email encryption?
500
1. Name 2. Home address 3. Social Security number 4. Credit card number
What are examples of PII (Personally Identifiable Information)?
500
Which policy has a section on Passwords that says: 1. Passwords should not be provided to anybody outside of the organization. 2. Some programs offer the ability to remember your password. The use of this feature is not authorized on Bank owned systems.
What is the Information/cybersecurity Program Policy?
500
The URL for Calhoun Banks Intranet page (AKA -Home Page)
500
Cell phones are not to be used to communicate Customer Personal Information. The Gramm-leach-Bliley Act requires that Personally identifiable financial information be secured at all times. If you don't protect financial data on mobile devices you could be subject to a fine in the amount of what?
What is $10,000 dollars?
500
This software will keep all viruses from infecting your computer.
Nothing, the software does not exist.