Terms
What is the practice of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information? HINT: It's in the name of the game
Cybersecurity
What is the most important thing you should do when you receive an email that feels suspicious?
Report it
What is the most commonly used password? HINT: you can count on someone using it.
123456
What are used by some websites to track your browsing history and target you with personalized ads? HINT: you can't eat them!
Cookies
What should you always do when you have to get up from your desk and leave your computer unattended?
Lock your computer
What is a common type of social engineering attack where an attacker impersonates a trusted individual or organization to trick a target into revealing sensitive information, often via a fake email?
Phishing
What's the red flag in this email snippet:
"From: Jacob Phisher <jphish@legit-gov-services.com>
Sent: Monday, September 16, 2024 9:55 AM"
Sender's name and email address
What should you never do with your passwords?
Share them with anyone or write them down
What is a setting in your browser that can help you avoid cookies?
Incognito mode or private browsing
A coworker says they need your information to log in as you "just for a minute" while you're not there. How should you respond?
Say no and tell your manager.
What security measure verifies the identity of a user by combining two or more different authentication factors?
Two-factor authentication
What should you never do with an email that seems suspicious?
Click on any links or attachments
What should you do if you suspect your password has been compromised?
Change it immediately
What is a common label used to indicate a sponsored link or advertisement on a search engine or website?
"Sponsored" or "Ad"
You write your password down on a post-it note and leave it at your desk, allowing anyone to see it. Does this make you negligent or a malicious insider threat?
Negligent
What is the term for unwanted and unsolicited junk mail sent in bulk?
Spam
What's the red flag in this email snippet:
"You acount password have expired. You must folow this intructions to reset it imediately."
Spelling / grammar
Where is the most secure place to store your passwords?
In a password manager (not written down on your desk)
What is an effective way to see the true destination of a suspicious link?
Hover your mouse over the link
Your coworker asks you to cover up an unauthorized action they performed. This would make your coworker a malicious insider. What should you do?
Don't cover it up and tell your manager
maybe replace
What is the term for software that is installed on a device to spy on the end user without their knowledge?
Spyware
What's the red flag in this email:
"URGENT! You must act now in order to prevent your account from being terminated!"
Threatening / urgent language
DAILY DOUBLE!
Which of these passwords is the strongest?
ILoveMyWife!1234, F00tb@11Be@g1e, CheeseburgerTruckLoverForever2024
F00tb@11Be@g1e
What type of malicious content can be hidden in ads or sponsored links?
Malware, phishing scams, or fake products
A vendor requests access to the company's system without IT's knowledge. What should you do?
Deny their request and redirect them to the IT department