Terminology
Programs
Best Practice
IT Security
ITSEC Terminology
100

RAM is also known as?

What is Random Access Memory

100

The program most commonly used to create a spreadsheet

What is Excel

100

If using a windows-based PC, you do this command to lock your computer before stepping away

What is Press the (CTRL+ALT+DEL) keys and select Lock this computer

100

To apply or maintain permissions to prevent an account from getting information they are not authorized to see while still making the information available to those who are unauthorized.

What is Access Control

100

The fraudulent attempt to obtain sensitive information such as usernames, password and credit card details (and money), often for malicious reasons

What is phishing

200

The address on a website located on the world wide web

What is URL (Uniform Resource Language)

200

The program most commonly used to make a slide show

What is Power Point

200

If leaving your system unattended you must use CTRL+ALT+DEL to lock your computer. What is a shorter sequence to do the same thing?

What is the Windows button + L key

200

What is PII?

What is Personal Identifiable Information

200

A fraudulent or malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver.

What is spoofing

300

The blinking line or shape on the screen that tells you where to the next character goes

What is the cursor

300

This program is used to scan your computer for Trojans, malware, and viruses.

What is antivirus

300

How does Two-Factor Authentication protect you?

The attacker would only have one password versus both that are required to login

300

If an employee is sending sensitive files in email that contain SSN, DOB, or other personal information, how should they transmit this data?

Encrypted using [Secure]

300

A hacker that choose to use their powers for good rather than evil. Also known as “ethical hackers,” can sometimes be paid employees or contractors working for companies as security specialists that attempt to find security holes via hacking.

What is a WhiteHat

400

What does PCI stand for?

What is Payment Card Industry

400

What is a program that tracks all your keystrokes and where you go on the internet

What is a keylogger

400

How should you leave your computer at the end of your shift?

What is logoff and leave powered on

400

How did a majority of celebrities get hacked in 2014? 

What is Social Engineering / Phishing Emails

400

This is a device that can steal your credit card information at any ATM location

What is a skimmer

500

What is HIPPA

What is the Health Insurance Portability and Accountability Act

500

What is the primary ticketing system the County utilizes?

What is ServiceNow

500

How should you properly transfer sensitive's files on USB drive?

What is using an encrypted thumb drive

500

What is the CIA Triad?

What is Confidentiality, Integrity, Availability

500

A part of the internet that is not visible to search engines and requires the use of an anonymous browser known as TOR

What is the DarkWeb