passwords Information Security Cyber Physical Security Disaster Recovery
100
What are more than 8 characters, letters numbers, symbols
Name 3 characteristics of a strong password
100
what is patching
I am the reason we reboot our PC's every night
100
What is cyber risk
The increased probability that the very-high impact, internet-based risks and threats we once thought were improbable will harm our networks
100
What is the clean desk policy
The policy that requires all sensitive information be removed from your desk, screens, and spaces when unattended.
100
What is Business Continuity Plan
Its initials are BCP
200
What is keypass or an encrypted database
I am the safest place to store your passwords
200
What is Non Public Customer Information
I am also known as NPCI
200
What is a Data Loss Prevention System
I am also known as a DLP System
200
what is the Blue Bin or large shred bin
The place I discard any trash that has PII, NCPI, or Bank proprietary information.
200
What is the Auburn Branch
The Bank's disaster recovery site
300
what is a post it note under the keyboard
I am the worst and most common place to hide a password
300
What is personally identifiable information
This may be referred to as PII
300
What is ransomeware
This evil malware encrypts your data for ransom (usually in bit coin)
300
What is skimming
The act of stealing Debit/ATM card data from a reader placed over a real reader on an ATM or other retail payment device.
300
What are
generator
dedicated DR PC's
dedicated DR Servers
physical supplies
List three thing the DR site has that others don't
400
what is a short sentence or phrase
This is the easiest way to create and remember a strong password
400
What is passwords
limit access
encryption
segmentation
Name an example of logical security
400
What is Phishing
I am the most common way to to get attack and or Hack
400
What is ebay
Easiest place to buy skimming kits (devices, cameras, software)
400
at least quarterly, all departments annually
The frequency at which we perform DR tests
500
what is Birthdays, Hobbies, Sports, Pets, Dictionary, etc
or something easily guessed
This should never be part of a password
500
What is GLBA or Privacy ACT or Mass 201 CMR 17
Name a regulation pertaining to Information Security
500
What is
large targets
easy to set up
don't need high percentage to click
Name some reasons Phishing is so popular
500
What are
alarms
vaults
access system
cash recyclers
cameras
lighting
mirrors
Name 3 security Devices found in a branch
500
What are
replicated to Franklin servers
replicated to auburn servers
saved to local server
replicated to COCC cloud
copied to external hard drive
List 2 ways data is backed up






IT and Security

Press F11 for full screen mode



Limited time offer: Membership 25% off


Clone | Edit | Download / Play Offline