Terms
What is the practice of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information? HINT: It's in the name of the game
Cybersecurity
What is the most important thing you should do when you receive an email that feels suspicious?
Report it
What is the most commonly used password? HINT: you can count on someone using it.
123456
What are used by some websites to track your browsing history and target you with personalized ads? HINT: you can't eat them!
Cookies
What should you always do when you have to get up from your desk and leave your computer unattended?
Lock your computer
What is a common type of social engineering attack where an attacker impersonates a trusted individual or organization to trick a target into revealing sensitive information, often via a fake email?
Phishing
FALSE
What should you never do with your passwords?
Share them with anyone or write them down
TRUE OR FALSE: Incognito mode or private browsing mode can help you avoid cookies.
TRUE
A coworker says they need your information to log in as you "just for a minute" while you're not there. How should you respond?
Say no and tell your manager.
What security measure verifies the identity of a user by combining two or more different authentication factors?
Two-factor authentication
What are the red flags in this email snippet:
"From: J@cob Phish3r <jphish@legit-gov-services.com>
Sent: Monday, September 16, 2024 9:55 AM"
Sender's name and email address
What should you do if you suspect your password has been compromised?
Change it immediately
What is a common label used to indicate a sponsored link or advertisement on a search engine or website?
"Sponsored" or "Ad"
You write your password down on a post-it note and leave it at your desk, allowing anyone to see it. Does this make you negligent or a malicious insider threat?
Negligent
What is the term for unwanted and unsolicited junk mail sent in bulk?
Spam
What should you never do with an email that seems suspicious?
Click on any links or attachments
Where is the most secure place to store your passwords?
In a password manager (not written down at your desk)
What is an effective way to see the true destination of a suspicious link?
Hover your mouse over the link
Your coworker asks you to cover up an unauthorized action they performed. This would make your coworker a malicious insider. What should you do?
Don't cover it up and tell your manager
The biggest security vulnerability in any organization is its own ___________.
Employees
What are the red flags in this email snippet:
"URGENT! You must act now in order to prevent your account from being terminated!"
Threats & urgent language
DAILY DOUBLE!
Which of these passwords is the strongest?
A) ILoveMyWife!1234,
B) F00tb@11Be@g1e,
C) CheeseburgerTruckLoverForever2024
B) F00tb@11Be@g1e
What type of malicious content can be hidden in ads or sponsored links?
Malware, phishing scams, or fake products
A vendor requests access to the company's system without IT's knowledge. What should you do?
Deny their request and redirect them to the IT department