Are You Smarter Than a CCO? 1,000,000 5th Level Topic 1 5th Level Topic 2 4th Level Topic 3 4th...
-
Upload
catherine-gotts -
Category
Documents
-
view
223 -
download
0
Transcript of Are You Smarter Than a CCO? 1,000,000 5th Level Topic 1 5th Level Topic 2 4th Level Topic 3 4th...
Are You Smarter Than a CCO?
Are You Smarter Than a CCO?
Are You Smarter Than a CCO?
Are You Smarter Than a CCO?
1,000,000
5th Level Topic 15th Level Topic 1 5th Level Topic 2
4th Level Topic 34th Level Topic 3 4th Level Topic 4
3rd Level Topic 53rd Level Topic 5 3rd Level Topic 6
2nd Level Topic 72nd Level Topic 7 2nd Level Topic 8
1st Level Topic 91st Level Topic 9 1st Level Topic 10
500,000
300,000
175,000
100,000
50,000
25,000
10,000
5,000
2,000
1,000
5th Level Topic 1 Question 5th Level Topic 1 Question
Which password is stronger?
Px6&fJ90 or
D0g......
Which password is stronger?
Px6&fJ90 or
D0g......
5th Level Topic 1 Answer 5th Level Topic 1 Answer
D0g...... is stronger because it has 9 characters versus 8 in Px6&fJ90. Password length is the most important factor in determining
strength and padding is a simple technique to lengthen passwords.
D0g...... is stronger because it has 9 characters versus 8 in Px6&fJ90. Password length is the most important factor in determining
strength and padding is a simple technique to lengthen passwords.
Return
5th Level Topic 2 Question 5th Level Topic 2 Question
Phishing and other forms of social engineering are on the rise and
one of the most significant threats to data security. True of false?
Phishing and other forms of social engineering are on the rise and
one of the most significant threats to data security. True of false?
5th Level Topic 2 Answer 5th Level Topic 2 Answer
True. Social engineering has risen to #3 on the Verizon 2014 top 20
threats.
True. Social engineering has risen to #3 on the Verizon 2014 top 20
threats.
Return
4th Level Topic 3 Question4th Level Topic 3 Question
We use a well known email vendor so internal emails are safe. True
or false?
We use a well known email vendor so internal emails are safe. True
or false?
4th Level Topic 3 Answer4th Level Topic 3 Answer
This is actually true. Almost all email vendors employ SSL
encryption which protects email to and from the email server. Internal emails do not travel
unprotected over the internet.
This is actually true. Almost all email vendors employ SSL
encryption which protects email to and from the email server. Internal emails do not travel
unprotected over the internet.Return
4th Level Topic 4 Question4th Level Topic 4 Question
What is a minimalist philosophy toward technology?
What is a minimalist philosophy toward technology?
4th Level Topic 4 Answer4th Level Topic 4 Answer
A minimalist philosophy is one where the technology is managed
to have as little hardware and software onsite as possible. A
minimalists will make liberal use of outsourced (ASP) solutions.
A minimalist philosophy is one where the technology is managed
to have as little hardware and software onsite as possible. A
minimalists will make liberal use of outsourced (ASP) solutions.
Return
3rd Level Topic 5 Question3rd Level Topic 5 Question
In a small firm the doomsday scenario is the IT Director going “postal.” What can you do to
protect against this risk?
In a small firm the doomsday scenario is the IT Director going “postal.” What can you do to
protect against this risk?
3rd Level Topic 5 Answer 3rd Level Topic 5 Answer
No question an IT Director with mal-intent can do tremendous damage. It is critical to protect your data with an independent
backup. This is a good example of redundancy.
No question an IT Director with mal-intent can do tremendous damage. It is critical to protect your data with an independent
backup. This is a good example of redundancy.
Return
3rd Level Topic 6 Question3rd Level Topic 6 Question
Which mobile operating system has the strongest inherent security?
iOS Android
Which mobile operating system has the strongest inherent security?
iOS Android
3rd Level Topic 6 Answer3rd Level Topic 6 Answer
iOS but Android is closing the gap. A primary advantage is iOS apps are only available from iTunes which is screened by Apple for
malware.
iOS but Android is closing the gap. A primary advantage is iOS apps are only available from iTunes which is screened by Apple for
malware.
2nd Level Topic 7 Question2nd Level Topic 7 Question
All documents containing non-public information should be
password protected when sent over the internet. True or false?
All documents containing non-public information should be
password protected when sent over the internet. True or false?
2nd Level Topic 7 Answer2nd Level Topic 7 Answer
False. Somewhat of a trick question. Password protection
differs from encryption. The best method of email delivery is via
secure portal which is encrypted.
False. Somewhat of a trick question. Password protection
differs from encryption. The best method of email delivery is via
secure portal which is encrypted.Return
2nd Level Topic 8 Question2nd Level Topic 8 Question
Sharing passwords is a violation of SEC Reg S-P. True or false?
Sharing passwords is a violation of SEC Reg S-P. True or false?
2nd Level Topic 8 Answer2nd Level Topic 8 Answer
No, but it should be.
Don’t share passwords!
No, but it should be.
Don’t share passwords!
Return
1st Level Topic 9 Question1st Level Topic 9 Question
Due to heightened awareness and superior technology, the number of data breaches is steadily declining.
True or false?
Due to heightened awareness and superior technology, the number of data breaches is steadily declining.
True or false?
1st Level Topic 9 Answer1st Level Topic 9 Answer
False. According to the Verizon 2014 Report, the number of
breaches dipped in 2012 but rose to highs near the 2011 level in 2013. The only category of breaches that
is in decline is physical attacks.
False. According to the Verizon 2014 Report, the number of
breaches dipped in 2012 but rose to highs near the 2011 level in 2013. The only category of breaches that
is in decline is physical attacks. Return
1st Level Topic 10 Question1st Level Topic 10 Question
Is the most commonly hacked password
123456 or
Password?
Is the most commonly hacked password
123456 or
Password?
1st Level Topic 10 Answer 1st Level Topic 10 Answer
123456 is the most commonly hacked password
123456 is the most commonly hacked password
Return
Million Dollar QuestionTopic 11
Million Dollar QuestionTopic 11
FirewallsFirewalls
1,000,000 Question1,000,000 Question
Is a firewall hardware, software or can it be either?
Is a firewall hardware, software or can it be either?
1,000,000 Answer 1,000,000 Answer
A firewall can be either hardware or software and there are few
advantages of one over the other.
A firewall can be either hardware or software and there are few
advantages of one over the other.
Return
Thanks for Playing!Thanks for Playing!