Ain't Misbehavin...
See M M See
When in Rome...
I fought the law
There is something Phishy
100

One of the most common breaches, following an authorized person through a secure door.

Tailgating

100

CMMC Level 2 is aligned with the controls from this specific NIST Special Publication.

What is NIST SP 800-171?

100

Travelers should enable this security feature on all their devices before traveling internationally to help prevent unauthorized access.

What is Multi-factor authentication (MFA) or strong passwords?
100

This is the term used when an employee maliciously gains unauthorized access to a network, information system, or application.  

What is hacking?

100

A type of malicious software designed to block access to a computer system until a sum of money is paid.  

What is ransomware?

200

Threats, intimidation, harassment, or any other inappropriate, disruptive behavior that causes fear from personal safety at the office.

Workplace Violence.

200

Specific information requires CMMC Level 2 or higher controls.

What is Controlled Unclassified Information (CUI)?

200

This is the term for an attempt by a foreign entity to obtain sensitive information through seemingly innocent conversations

What is foreign elicitation?

200

Lying on a security clearance application (SF-86) or failing to provide candid answers during an investigation raises significant concerns under this guideline.

What is Adjudicative Guideline E (Personal Conduct)?

200

The process of taking plain text and scrambling it into an unreadable format.  

What is encryption?

300

Adjudicators consider an applicant's entire history, both favorable and unfavorable, under this guiding principle.

Whole person concept.

300

Entity responsible for assessing CMMC Level 2 compliance.  

What is Certified Third-Party Assessor Organization (C3PAO)?

300

This type of spying involves stealing information for a foreign government or organization, often by means of Human Intelligence (HUMINT), technical surveillance, and cyber activity, for the purpose of strategic advantage or planned malicious activity.

What is foreign espionage?


300

Even if a charge was not for a serious offense like a DUI, incidents must be reported if this substance was involved.

What is alcohol?

300

Fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.

What is smishing?

400

A former NSA contractor who smuggled classified U.S. government data using a USB drive, exposing global surveillance programs run by U.S. and allies.  The leaks led to diplomatic tensions, legal reforms, and a major debate on privacy and national security.

Edward Snowden

400

This document is used to track the plan for correcting any identified weakness or deficiencies.

What is A Plan of Action and Milestones (POA&M)?

400

This social media platform is increasingly used by foreign operatives to connect with professionals and extract information from cleared workers.  

What is Linked-In?

400

This is the term for violent, criminal acts committed by individuals and/or groups to further ideological goals stemming from domestic influences, such as those of a political, religious, social, racial, or environmental nature.

What is domestic terrorism?

400

Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.  

What is malware?

500

Actions like refusing to cooperate with security processing, providing truthful answers, and a history of rule violations. 

What are some clearance disqualifiers? 

500

This is the government agency that mandates CMMC for its contractors.    

What is Department of Defense?

500

This requires approval, must be submitted at least five business days in advance and requires escorting.

What is foreign national visitors?

500

This infamous spy was a CIA case officer who was arrested and charged with spying on behalf of Russia, and compromised at least 100 U.S. intelligence operations as well as the execution of at least ten U.S. sources.

Who is Aldrich Ames?

500

Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.

What is vishing?