Alphabet Soup
Cybersecurity Savvy
Recovery Riddles
365 Suite Success
100

BIOS

What is Basic Input/Output System?

100

Unsolicited and often irrelevant email messages, typically for advertising or malicious purposes.

What is Spam?

100

This non-subscription hardware appliance is frequently used by ST as a backup destination.

What is Synology Diskstation?

100

Focused on file storage for the individual, this Microsoft 365 service provides cloud storage and file sharing capabilities.

What is OneDrive?

200

NTFS

What is New Technology File System?

200

This is a type of phishing attack that targets high-profile individuals within an organization to steal sensitive information or gain access to their accounts.

What is Whaling?

200

This backup method involves copying all data every time a backup is performed.

What is a Full Backup?

200

This Microsoft 365 service provides cloud-based email and calendaring.

What is Exchange Online?

300

TLS

What is Transport Layer Security?

300

This is a type of brute force attack where hackers attempt to guess passwords by systematically trying a list of commonly used words and phrases.

What is a Dictionary Attack?

300

This type of backup involves copying data to a physical device like a tape or external drive.

What is a Local Backup?

300

This 365 service provides endpoint security and management.

What is Microsoft Intune?

400

DNS

What is Domain Name System?

400

A form of social engineering that uses SMS messages to trick users into revealing personal information or clicking on malicious links.

What is Smishing?

400

This is a subscription-based backup solution used by ST that includes a backup appliance. 

What is Datto BCDR?

400

This 365 service allows users to create automated workflows between apps and services to synchronize files, get notifications, collect data, and more.

What is Power Automate?

500

ICMP

What is Internet Control Message Protocol?

500

This type of attack occurs when a cyber threat actor infiltrates a vendor’s network to compromise software or hardware before it reaches the customer, thereby spreading the compromise to the end users.

What is a Supply Chain Attack?

500

This type of backup captures only the changes made since the last full backup.

What is a Differential Backup?

500

This feature helps protect sensitive data by preventing its accidental loss or unauthorized sharing.

What is Data Loss Prevention (DLP)?