What is the acronym and full form of our team name on Microsoft teams ?
MAT (Metrics and Automation Team)
What does GISMR stand for ?
Global Information Security Metrics Report
What does IDP Stand for ?
Information Delivery Platform
What is the first and last name of BMO's CISO ?
Sri Dronamraju
To what email address are you supposed to report suspicious emails sent to your BMO email?
IsIt.Safe@bmo.com
what does CISMP stand for ?
Centralized Information Security Metrics Program
What is the mean and standard deviation of a standard normal distributed data ?
mean = 0
standard deviation = 1
The word “malware” is actually a combination of two words. What are those two words ?
Malicious and software
What is the telephone version of phishing called ?
Vishing
What does OCC Stand for ?
Office of the Comptroller of the Currency
A certain couple tells you that they have two children, at least one of which is girl. What is the probability that they have two girls ?
1/3
To help keep customers safe, BMO offers services and software that protect customer identity and information. what is the name of the service provided by BMO to monitor suspicious customer activity that might be fraudulent.
OnGuard identity theft service
What is the term for the practice of following someone into an office without using a pass ?
Piggybacking or Tailgating
To ensure that the appropriate security due diligence activities have been completed prior to implementation, what checklist should be opened at the start of the project, completed over the duration of the project, and approved prior to implementation ?
Security Pre-Implementation Review (SPIR) Checklist
What will be the out put for following code in the SAS Programming
x=1, y=3, z= .
SAS Code
A= sum(x,y,z)
B=x+y+z
A=? , B=?
A= 4
B= .
Some social engineers create a scenario to engage a targeted victim that increases the chance the victim will provide them with information. Such as posing as a person of authority, like a security officer. What is this called ?
Pretexting
Social engineers have been known to leave a malware-infected USB key in a bathroom, elevator or public place with an official looking logo on it, all in the hopes the victim will load it onto their computer. What type of social engineering tactic is this ?
Baiting
Book of record(BoR) for all IS process maps and Standard Operating Procedures (SOPs) housed within which application ?
Enterprise Nimbus
What is sum of 1 to 100 ?
n*(n+1)/2 i.e. 5050
What is the name for the spyware that collects the information that you type into your computer ?
Keyloggers or Keystroke logger