RAM is also known as?
What is Random Access Memory
The program most commonly used to create a spreadsheet
What is Excel
If using a windows-based PC, you do this command to lock your computer before stepping away
What is Press the (CTRL+ALT+DEL) keys and select Lock this computer
To apply or maintain permissions to prevent an account from getting information they are not authorized to see while still making the information available to those who are unauthorized.
What is Access Control
The fraudulent attempt to obtain sensitive information such as usernames, password and credit card details (and money), often for malicious reasons
What is phishing
The address on a website located on the world wide web
What is URL (Uniform Resource Language)
The program most commonly used to make a slide show
What is Power Point
If leaving your system unattended you must use CTRL+ALT+DEL to lock your computer. What is a shorter sequence to do the same thing?
What is the Windows button + L key
What is PII?
What is Personal Identifiable Information
A fraudulent or malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver.
What is spoofing
The blinking line or shape on the screen that tells you where to the next character goes
What is the cursor
This program is used to scan your computer for Trojans, malware, and viruses.
What is antivirus
How does Two-Factor Authentication protect you?
The attacker would only have one password versus both that are required to login
If an employee is sending sensitive files in email that contain SSN, DOB, or other personal information, how should they transmit this data?
Encrypted using [Secure]
A hacker that choose to use their powers for good rather than evil. Also known as “ethical hackers,” can sometimes be paid employees or contractors working for companies as security specialists that attempt to find security holes via hacking.
What is a WhiteHat
What does PCI stand for?
What is Payment Card Industry
What is a program that tracks all your keystrokes and where you go on the internet
What is a keylogger
How should you leave your computer at the end of your shift?
What is logoff and leave powered on
How did a majority of celebrities get hacked in 2014?
What is Social Engineering / Phishing Emails
This is a device that can steal your credit card information at any ATM location
What is a skimmer
What is HIPPA
What is the Health Insurance Portability and Accountability Act
What is the primary ticketing system the County utilizes?
What is ServiceNow
How should you properly transfer sensitive's files on USB drive?
What is using an encrypted thumb drive
What is the CIA Triad?
What is Confidentiality, Integrity, Availability
A part of the internet that is not visible to search engines and requires the use of an anonymous browser known as TOR
What is the DarkWeb