Actions
Devices
Policy
Social
Name Game
100

Always be looking for ________ messages when checking email.

What is phishing?

100

The most popular operating systems for laptops.

What is Microsoft Windows?

100

Minimum character recommendation for your passwords.

What is 16 characters?

100

Still the most popular social media service in the world.

What is Facebook?

100

The INL phone number to call with cybersecurity questions.

What is (208) 526-1000, or 6-1000?

200

A good method to check if a suspicious message from a co-worker is legitimate.

What is call them or contact them via another communication method or check with AskCyber?

200

This physical part of your laptop should be covered when not in use- just in case someone is watching.

What is the webcam?

200

What to do if you recognize a message you just received is phishing.

What is report it?

200

This kind of engineering isn’t about building bridges- it's about manipulating people.

What is social engineering?

200

The INL group that handles computer support calls.

What is the Service Desk?

300

Scammers ask for payment via one of these methods because they are very difficult to trace and recover. (name any one)

What are payment apps, gift cards, cryptocurrency or wire transfers?

300

This is used to create a secure connection over a less secure network, often used in remote work scenarios.

What is a VPN (Virtual Private Network)?

300

You should do this before using a USB drive someone found “just lying around” at an INL facility or parking lot.

What is turn it in or report it?

300

These social media settings should be set to your comfort level and checked regularly, like at least once a year.

What are privacy settings?

300

The name of INL's VPN and network security tool.

What is Zscaler?

400

The first action to take if you accidentally click on a real phishing email at INL.

What is immediately call the Service Desk?

400

Always keep software ________ on all your devices especially those connected to the internet.

What is “updated”?

400

The name of the password management software approved for use on INL computers.

What is KeePass or the Mac Keychain or Mac Passwords app?

400

This type of phishing attack targets specific individuals or organizations with personalized messages.

What is spear phishing?

400

The second most popular social media service in the world.

What is Youtube?

500

Cybersecurity experts hope everyone starts using these instead of passwords.

What are passkeys?

500

The common nickname (________ ray) used by law enforcement for an International Mobile Subscriber Identity (IMSI) catcher.

What is "Stingray"?

500

This chinese-made AI tool is the most recent application to be prohibited from U.S. Government computers.

What is DeepSeek?

500

The psychological term _______ proof is the word for doing something because you notice a lot of other people doing the same thing. It's especially effective if you know people you admire do it.

What is social proof?

500

The cybersecurity definition of the acronym EDR (_________ Detection and Response) which includes Antivirus protection.

What is Endpoint Detection and Response?