Social Engineering
Phishing
Physical Security
Data Protection
Ransomware
100

Using deception to manipulate individuals into disclosing information is also known as

What is social engineering?

100

Looking at the URL on an email you notice it's abbreviated to bit.ly/20aadf. Would you click it?

What is No? (You don't know where it goes)

100

The protection of personnel, hardware, software, networks, and data from physical attack is also known as...

What is physical security?

100

All information owned by Trend Micro and entrusted to it by its customers is considered by default ___________ information.

What is confidential?

100

This currency offers anonymity and does not have a central authority of control—that is why cybercriminals commonly utilize this as a mode of payment.

What is Bitcoin?

200

A social engineering tactic where a person uses online communication to deceive the victim into clicking a link.

What is phishing?

200

Looking at the URL on an email you notice it leads to HTTPS://SECURE.YAH00.COM. Would you click it?

What is No. (it has zeroes, not o's)

200

The selective restriction of access to a place or resource.

What is access control?

200

This security policy says sensitive materials are to be removed or locked away when not in use.

What is clean desk policy?

200

Famous ransomware targeting Windows, encrypted files and demanded payment by bitcoin.

What is Wannacry?

300

Two major consequences of a breach would be a loss of reputation and  ….

What is a financial loss?

300

Looking at the URL on an unsolicited email you see a link to https://google.com . Would you click it?

What is No?

300

These are pocket-sized plastic cards with embedded integrated circuits, used for authentication.

What are smart cards?

300

This policy says company information must be properly identified to prevent improper dissemination.

What is the information classification policy?

300

Government agency that was responsible for developing Eternal Blue exploit.

What is NSA?

400

Sending emails from an apparently-trusted sender in order to induce specific individuals into clicking.

What is spear phishing?

400

Looking physically in garbage bins for company-specific data for future phishing attacks is called.

What is dumpster diving?

400

In the event of power disruption, doors unlocked so people are not trapped, this refers to a _____ -setting

What is fail-safe setting?

400

This regulation standardizes data protection law across all 28 EU countries.

What is the General Data Protection Regulation (GDPR)?

400

Unlike Crypto-ransomware, this type of ransomware locks the computer or device preventing them from logging in.

What is locker ransomware?

500

Phishing that targets high-level executives.

What is whaling?

500

This is a recommended security practice against dumpster diving before disposal of sensitive paper documents.

What is shredding?

500

Using a double set of doors to prevent piggybacking by allowing only a single individual to enter a facility at a time.

What are mantraps?

500

The GDPR introduces a right for individuals to have personal data erased. The right to erasure is also known as.

What is the right to be forgotten?

500

It was the first example of ransomware that encrypted users' data with a different symmetric key for each file.

What is CryptoLocker?