Drill Flashcards

1
Q

Phising

A

attempting to get sensitive info such as usernames, passwords, and credit card details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

spear phishing

A

focused, targeted phishing attack on a specific person or organization, with the goal to penetrate their defenses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

phishing attack surface:

A

The amount of emails showing on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Phish-prone Percentage:

A

that indicates the percentage of employees that are prone to click on phishing links. (A term coined by KnowBe4 )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Console:

A

A user interface that manages and controls software and/or hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

LMS (Learning Management System)

A

Is basically where e- learning content is housed, example Bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ransomware

A

Vicious malware that locks users out of their devices until a sum of money is paid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

protected health information (PHI):

A

recorded info about a persons health status, including their health care coverage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

personally identifiable information (PII)

A

Information that can be used on its own or with other info to identify, contact, or locate a single person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PCI DSS (Payment Card Industry Data Security Standard):

A

A document published by Payment Card Industry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

botnet:

A

network of robots that live on infected computers, and are controlled by the bad guys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

security awareness training (SAT):

A

training that raises the awareness of a user to potential threats, and how to avoid them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Kevin Mitnick:

A

The World’s Most Famous Hacker.” and Kevin’s main contribution to KnowBe4 is his experience!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The Six Steps to Successful Security Awareness Training (SAT)

A

Step 1: Have a security policy, and have each employee read and sign it.
Step 2: Have all employees take mandatory SAT (online), with a clear deadline and reasons why they’re taking the training.
Step 3: Make SAT part of the onboarding process (new hires in a company).
Step 4: Regularly test employees to reinforce the SAT its application.
Step 5: Employees who fails test to meet with HR
Step 6: Send regular hints and tips via email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

7 reasons why an organization would outsource security awareness training:

A
  1. Reduce costs
  2. Access to talent
  3. Geographic reach and scalability
  4. Compliance
  5. Mitigate Risk
  6. Business Focus
  7. Leverage cost of technology.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Defense in depth:

A

A security discipline that refers to having layers of protection in an IT infrastructure.

  1. Policies, Procedures & Awareness
  2. Perimeter
  3. Internal Network
  4. Host
  5. Application
  6. Data
17
Q

EEC (Email Exposure Check)

A

check to see how many emails are exposed of the company..

18
Q

Ransomware Simulator (RanSim):

A

allows users to see if their antivirus software is incorrectly blocking files.

19
Q

data breach:

A

The intentional or unintentional release of secure information to an un-trusted environment

20
Q

Phish Alert Button (PAB):

A

An email plugin that gives users a safe way to handle actual or potential phishing emails.