An email claiming your bank account is compromised, and they want your personal information and, most likely your identity, by directing you to a fake website, is an example of ____.
What is Phishing?
Like a leech, a ____ attaches itself to another program, file, or disk.
What is COVID?
____ uses multiple layers of defense to address technical, personnel, and operational practices.
What is defense in depth?
Clinical protocols, payroll information and unpublished market research are all examples of ____ information.
What is highly restricted?
____ is what should do when you are finished with work on your laptop for an extended period of time.
What is shutting down your laptop?
____ may only be 20% of the threat, but they produce 80% of the damage.
What are Insiders?
Your grandma sends you a random link to follow over FB Messenger, but actually it’s a ____.
What is a worm?
___ should be kept private, secret, easily remembered and changed regularly.
What are passwords?
___ information that, if disclosed to unauthorized individuals, could have a moderate impact on VitalTrax’s business interests including competitiveness, goodwill, or ability to meet legal or regulatory requirements.
What is confidential?
When you are in ____, you should never leave your laptop unattended.
What are public spaces?
____ create tools for hacking and often hack computers for no criminal reason.
What are hacking groups?
This type of program can often be used for legitimate reasons, but don’t pay the fee and it may malfunction.
What is a logic bomb?
___ carefully analyze incoming traffic based on pre-established rules and filter traffic coming from unsecured or suspicious sources to prevent attacks.
What are firewalls?
Press releases are no risk to the company as these are ____.
What is public information?
By not opening email attachments unless you are expecting the email with the attachment and you trust the sender, you will avoid _____.
What is social engineering?
"Buy this time-share" is a clever example of how _____ cheat others out of something valuable.
What are scammers?
Have you ever received hundreds of ad popups over and over and can’t make it stop..this may be caused by ____.
What is adware?
___ details the process for handling confirmed security incidents.
What is SOP 105 – Issue Management?
Information that is intended for public disclosure is ______.
What is unclassified?
Looking for https or the lock symbol near the url, ensures you are using _____.
What is secure browsing?
____ wants to be a hacker but lacks any serious technical expertise.
What are script kiddies?
____ is when an attacker pretends to be your final destination, but it’s only a premonition.
What is man in the middle attack?
___ is one of the most persistent threats on the internet today.
What is fake antivirus software?
The correct order from most to least damaging content if it was given to an unauthorized person is ___.
What is highly restricted, restricted, confidential and unclassified/public?
You should call the recipient of highly restricted or restricted content when ____ them the documents.
What is faxing?