| passwords | Information Security | Cyber | 
|---|---|---|
| 
						
					 
					  What is strong password					 
					
					 more than 8 characters, letters numbers, symbols 
					 | 
				
				
						
					 
					  why do we reboot at night					 
					
					 patching 
					 | 
				
				
						
					 
					  What is cyber risk					 
					
					 The increased probability that the very-high impact, internet-based risks and threats we once thought were improbable will harm our networks 
					 | 
						
| 
						
					 
					  where is the best place to store a password					 
					
					 keypass or encrypted database 
					 | 
				
				
						
					 
					  What is NPCI					 
					
					 non public customer information 
					 | 
				
				
						
					 
					  What is  a DLP system					 
					
					 Data Loss Prevention 
					 | 
						
| 
						
					 
					  where are written password likely to be found					 
					
					 post it note under the keyboard 
					 | 
				
				
						
					 
					  What is PII					 
					
					 personally identifiable information 
					 | 
				
				
						
					 
					  What is ransomware					 
					
					 malware that encrypts your data for ransom (bit coin) 
					 | 
						
| 
						
					 
					  what is the easiest way to create a strong password					 
					
					 Short sentences 
					 | 
				
				
						
					 
					  What is an example of logical security					 
					
					 passwords 
					limit access encryption segmentation  | 
				
				
						
					 
					  What is is the most common way to get attacked					 
					
					 Phishing 
					 | 
						
| 
						
					 
					  why do passwords expire					 
					
					 can be figured out easier over time 
					 | 
				
				
						
					 
					  What is a regulation  pertaining to Information Security					 
					
					 GLBA 
					Privacy ACT  | 
				
				
						
					 
					  why is phishing so popular					 
					
					 large targets 
					easy to set up don't need high percentage to click  |