Phishing
Incident Management
Passwords
Malware
100

This is the most common method cybercriminals use to gain unauthorized access to systems.

Phishing.

100

This allows an organization to bring together and organize the needed resources to deal with an adverse event related to the safety and security of information system resources.

Cyber Incident Response Plan

Cybersecurity Incident Response Plan


100

This is a string of characters which serves as authentication of a person's identity and may be used to grant or deny access to private or shared data.

A password.

100

This is a type of malware that encrypts a victim's files or locks them out of their own system, demanding a ransom (typically in cryptocurrency) to provide the decryption key or to unlock the system.

Ransomware.

200

This is what you do if you receive a phishing email.

Report it as phishing on the email system.

200

This is the first step to managing a cybersecurity incident.

Preparation.

200

This is a tool that securely stores and generates passwords.

A password manager or password management tool.

Bitwarden.

200

Name a way malware can enter a device.

Through an email attachment, by downloading something, or through exploiting a software vulnerability.

300

This is the person you contact if you accidentally clicked on a phishing link.

IT Support/Systems Admin


300

This is the person you contact if someone has resigned to initiate the process of resetting account credentials.

HR

300

This is the minimum number of characters a password should have.

8.

300

Provide at least 3 common signs of malware infection on a computer.

1. You are locked out of an account/device/file.

2. Unexpected pop-up ads.

3. Changes in system/browser settings.

4. Unexplained data usage.

5. Slow computer performance.

6. Disabled antivirus or security software.

7. System crashes or freezes.

8. Unwanted toolbars.

9. Unusual hard drive activity.

10. Strange emails or messages.

400

Provide at least 4 signs that an email may be a phishing attempt.

1. Sender's email looks weird/suspicious.

2. It has a sense of urgency/threat.

3. There is a weird link in the email.

4. There is an unsolicited/weird attachment in the email.

5. Misspelled words or grammatical errors.

6. It sounds too good to be true.

7. Mismatched logos and branding.

8. The sender requests personal information.

9. The sender requests the receiver perform an unusual action.

400

This mechanism provides an extra layer of security when logging into an application by requiring an additional form of verification, besides your password.

2FA or two-factor authentication.

Multi-factor authentication.

400

Name at least 4 types of common malware.

Viruses, Trojans, worms, spyware, ransomware, adware, keyloggers, botnets, rootkits, browser hijackers, scareware, RAM scrapers, malicious macros