ID Badges
Word Jumble
Untrustworthy Downloads
Fun with Policies
What is My Name?
100

Should your badge be worn so that it is visible to others?

What is yes?

100

rokewtn

What is Network?

100

This is harmful software that may attach itself to other programs in order to destroy files or a computer's ability to function normally.

What is Virus?

100

According to the IT Acceptable Use Policy, Integer proprietary information stored on electronic devices belongs to who?

Who is Integer?

100

A group of computers linked together for collaboration and sharing.

What is a Network?

200

What should you do if you see someone without a badge visible passes you in the hall?

What is Ask to see their badge or escort them to the front desk, EHSS or HR?

200

wlalierf

What is Firewall?

200

An automated program that uses networks or the Internet.

What is BOT?

200

True or False - Does Integer allow occasional personal use of company resources so long as activity is not unprofessional, inappropriate conduct and does not interfere with employment responsibilities or productivity?

What is True?

200

Downloading a document and claiming it as my own is called.

What is Plagiarism?

300

What should you do if you find an ID badge in the parking lot?

What is turn it in to your building EHSS, manager or front desk etc.?

300

sesernwaa

What is Awareness?

300

This is an independent virus program that replicates from machine to machine, doing various types of damage as it spreads.

What is a Worm?

300

Integer IT policy that states user account passwords must not be written down or otherwise shared?

What is IT User Account Management or Password Policy?

300

Anyone, regardless of their intentions, who utilizes their technical knowledge to bypass security measures on a computer, device or network.

Who is a Hacker?

400

Should your badge be worn around the neck or clipped on your clothes so its visible to others?

What is yes or both?

400

raelawm

What is Malware?

400

This is used to record information about all of your computer keyboard activities.

What is a Keylogger?

400

True or False - Using the "remember my password" functionality within applications and web browsers is safe and helps you manage your passwords.

What is False?

400

A targeted email that attempts to steal sensitive information like account credentials or financial information from a specific victim, often for malicious reasons.

What is Spear Phishing?

500

Should you allow someone who has forgotten their ID badge to follow you into the building?

What is no?

500

tiyilbrealnuv

What is Vulnerability?

500

This harmful computer program can be easily installed on your computer while you are downloading unknown programs or files from unknown sources.

What is a Trojan?

500

Within the IT Acceptable Use Policy, what is required before you install new software or hardware on an Integer computer system or network?

What is Approval from IT?

500

A component of a computer system or network which is designed to block unauthorized access while permitting authorized communication.

What is a firewall?