This method replaces short passwords with a longer, safer approach.
A: Passphrase
B: Pin
C: Multi-Factor Authentication
D: Long Password
A: Passphrase
This label applies to information like SSN or Payroll information:
A: Public
B: Sensitive
C: Confidential
D: All of the Above
This type of email pretends to be urgent to trick you into clicking a link.
A: Memo from Bill
B: Phishing Email
C: Rocket Cyber Alert
D: Monthly News Letter
B: Phishing email
This is the first thing you should do when you spot a suspicious system behavior.
A: Ignore it, there's 20 tickets in Triage
B: Report it to the Secure Outcomes Team
C: Tell the user
D: Reboot the system and hope it disappears
B:Report it to the Secure Outcomes Team
This policy requires you to lock your workstation when stepping away.
A: Remote Work
B: Clean Desk
C: Acceptable Use
D: Employee NDA
B: Clean Desk
This tool safely stores and generates strong passwords.
A: Bitlocker
B: Password Manager
C: Malware Bytes
D: Autotask
B: Password Manager
This technique changes sensitive information so only authorized parties can read.
A: Creating multiple subfolders to hide a document
B: Hide and Seek
C: Encryption
D: Phishing
C: Encryption
This common scam pretends to come from your boss asking for gift cards.
A: Christmas Party Email Chain
B: Spear Phishing
C: Malware
D: Trick question it's a legitimate email
B: Spear Phishing
This team should always be notified of potential breaches.
A: Secure Outcomes
B: Manchester United
C: Penguins
D: Leadership Team
A: Secure Outcomes Team
This term refers to when an attacker looks over your shoulder to view confidential information on your PC.
A: Packet Sniffer
B: Surfing USA
C: Peek A Boo Attack
D: Shoulder Surfing
D: Shoulder Surfing
This extra layer of security protects you if your password is compromised:
A: Multi Factor Authentication
B: Passphrase
C: Microsoft Sentential
D: Physical Layer
A: Multi Factor Authentication
You should never store confidential data on these systems.
A: Public Systems
B: Private Systems
C: Approved devices
D: A Locked Filing Cabinet
A: Public Systems
This is the best first step when you suspect an email is fake.
A: Click on the link to see if it's safe
B: Reply to the sender and ask if it is legitimate
C: Forward it to your coworkers
D: Report it to IT/Security
D: Report it to IT/Security
This should never be done when you think you clicked something malicious.
A: Ignore it
B: Notify the Secure Outcomes Team
C: Create a See Something Say Something Team
D: All of the Above
A: Ignore it
This document dictates the proper actions in the event of a incident.
A: Business Continuity Policy
B: See Something Say Something
C: Incident Response Plan
D: Data Protection Policy
C: Incident Response Plan
Reusing this across multiple accounts increases the risk of compromising accounts.
A: The same username
B: The same password
C: The same MFA App
D: The same Computer
B: The same password
This principle ensures employees only access what they need for their job.
A: Global Access
B: User Access
C: Admin Access
D: Least Privileged
D: Least Privileged
This file type can be used to inject malware into 365 apps just by being previewed in Outlook:
A: RTF
B: JS
C: PDF
D: ZIP
A: RTF
Quick reporting helps reduce this critical factor.
A: The number of employees at the company
B: Number of tickets created
C: Damage or impact
D: Reduced Rates
C: Damage or impact
This Policy dictates the proper use of Company Assets.
A: Clean Desk Policy
B: Acceptable Use Policy
C: Dress Code Policy
D: Incident Response Policy
B: Acceptable Use Policy
When making a password you should never use:
A: All the Below
B: Less than 8 Characters
C: Easily Guessable Information (ie: your dogs name)
D: Letters or numbers in order (ie: 1234, qwerty)
After printing documents that contain sensitive information, this follow-up action is required to maintain proper security handling.
A: Shred the documents or store in a locked file cabinet
B: Leave the documents on the printer
C: Store the papers in any nearby drawer
D: Scan and email the documents to yourself
A: Shred the documents or store in a locked file cabinet
After entering your correct credentials into a link you were emailed and receiving an error, you have most likely been:
A: Having a bad day
B: Not turned on Num Lock
C: Reset your password
D: Phished
D: Phished
The responsibility of following up on alerts falls to.
A: Secure Outcomes Team
B: Leadership Team
C: Technicians
D: All of the Above
D: All of the Above
Non Company Employees are required to do this when entering the building.
A: Recite the Scout Law
B: Go through the Metal Detector
C: Be pat down
D: Sign in
D: Sign in