Actions
Devices
Policy
Social
Name Game
100

Always be looking for ________ messages when checking email.

What is phishing?

100

The most popular operating systems for laptops.

What is Microsoft Windows?

100

Minimum character recommendation for your passwords.

What is 16 characters?

100

Still the most popular social media service in the world.

What is Facebook?

100

The INL phone number to call with cybersecurity questions.

What is (208) 526-1000, or 6-1000?

200

A good method to check if a suspicious message from a co-worker is legitimate.

What is call them or contact them via another communication method or check with AskCyber?

200

This physical part of your laptop should be covered when not in use- just in case someone is watching.

What is the webcam?

200

What to do if you recognize a message you just received is phishing.

What is report it?

200

This kind of engineering isn’t about building bridges- it's about manipulating people.

What is social engineering?

200

The INL group that handles computer support calls.

What is the Service Desk?

300

Scammers ask for payment via one of these methods because they are very difficult to trace and recover. (name any one)

What are payment apps, gift cards, cryptocurrency or wire transfers?

300

This is used to create a secure connection over a less secure network, often used in remote work scenarios.

What is a VPN (Virtual Private Network)?

300

You should do this before using a USB drive someone found “just lying around” at an INL facility or parking lot.

What is turn it in or report it?

300

These social media settings should be set to your comfort level and checked regularly, like at least once a year.

What are privacy settings?

300

The name of INL's VPN and network security tool.

What is Zscaler?

400

The first action to take if you accidentally click on a real phishing email at INL.

What is immediately call the Service Desk?

400

Always keep software ________ on any device connected to a network or the internet.

What is “updated”?

400

The name of the password management software approved for use on INL computers.

What is KeePass or the Mac Keychain or Mac Passwords app?

400

This type of phishing attack targets specific individuals or organizations with personalized messages.

What is spear phishing?

400

The second most popular social media service in the world.

What is Youtube?

500

The best way to use your phone for Multi-Factor Authentication method 

What is use an authenticator app?

500

The group name for devices like smart doorbells, smart cameras, and smart TV's.

What is "Internet of Things" (IOT)?

500

This AI tool is the most recent application to be prohibited from U.S. Government computers.

What is DeepSeek?

500

The main reason most social media services are free.

What is so they can collect information about you for advertising?

500

The cybersecurity concept that says never trust any device or person on a network (unless you regularly verify them)

What is Zero Trust?