Drill #5 Flashcards

1
Q

firewall

A

software to block unauthorized network access and only permits authorized communications/requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

cloud computing

A

the practice of using remote servers on the Internet to store, manage, and process data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

security awareness training (SAT)

A

Any training to get users to make smarter security decisions and help their organization manage the ongoing problem of social engineering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Kevin Mitnick

A

known as the “World’s Most Wanted Hacker.” Today, Kevin’s positioned as “The World’s Most Famous Hacker.”

part owner and the Chief Hacking Officer of KnowBe4.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

learning management system (LMS)

A

A system for managing and delivering training courses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

return on investment (ROI)

A

amount of return on an investment relative to cost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Shareable Content Object Reference Model (SCORM)

A

technical standard that governs how learning content and LMS communicate with each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Six Steps to Successful Security Awareness Training

A

Step 1:
Have a policy, and have each employee read and sign it.

Step 2:
Have all employees take mandatory SAT (online)

Step 3:
Make SAT part of the onboarding process

Step 4:
Regularly test employees

Step 5:
Have employees who fail phishing tests face consequences and remedial training; reward employees with low failure rates.

Step 6:
Send regular security hints and tips to all employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

7 reasons why an organization would outsource security awareness training

A
Reduce costs
Access to talent
Geographic reach and scalability
Compliance
Mitigate risk
Business Focus
Leverage the cost of technology
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Defense in depth

A

having layers of IT security protection in an IT infrastructure and organization

so that security is not dependent on any single layer

  1. Policies, Procedures, and Awareness
  2. Perimeter
  3. Internal Network
  4. Host
  5. Application
  6. Data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

social engineering indicators (SEI)

A

A feature of KnowBe4’s simulated phishing campaigns that shows a user the red flags they missed when clicking on a link in a simulated phishing campaign.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Artificial Intelligence Driven Agent (AIDA)

A

AI tool that sends a multi-vector social engineering attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly