© 2015 Air Force Association
Instructions Before playing: Identify and mark a 3-point and 4-point line away from a garbage can or another receptacle Wad up a piece of paper or have a ball handy Split into teams. Each team will start with ten Xs. Teams will take turns answering questions. If your team answers its question correctly, you can choose to take a shot from the 3-point or 4-point line. If you make your shot, you can erase a total of three or four Xs from other teams. If you miss, you can still take a total of two Xs from other teams. The last team with Xs win.
What directs traffic within a network? ANSWER: Switch
How does anti-virus software work? ANSWER: It scans your files/software for matches in a regularly updated database of known malware
What is ROM short for? ANSWER: Read-Only Memory
What do you call social engineering attempts sent by text message? ANSWER: Smishing
Confidentiality, Integrity, Availability The three main goals of info security are to maintain information C______ I______ A______ ANSWER: Confidentiality, Integrity, Availability
What do you call a password cracking attempt that tests all possible combinations of letters, numbers, and characters? ANSWER: Brute Force Cracking
What maximum password age do we recommend for standard user accounts? ANSWER: 90 days
Host [operating system] When working with virtual machines, what do you call the OS on the physical computer? ANSWER: Host [operating system]
Name at least two cybersecurity tools displayed in Action Center POSSIBLE ANSWERS: Firewall, Anti-Virus, Windows Updates
Password Policies and Account Lockout Policies What two types of security settings can you find in the Local Security Policy menu? ANSWER: Password Policies and Account Lockout Policies
What is one benefit of working with virtual machines? POSSIBLE ANSWERS: Can run multiple OSs on one computer, can use to test software in a safe environment, saves money/real estate, portable
What do we recommend for minimum password length? ANSWER: At least ten characters
How long should an account stay locked out before a user can try to log in again? ANSWER: 30 minutes
What free anti-malware program did we recommend installing? ANSWER: Microsoft Security Essentials
Where should symbols be placed in your password? ANSWER: In the middle!
What type of malware can spread without human assistance? ANSWER: Worm
Fingerprints and retina scans are examples of this type of authentication tool. ANSWER: Biometrics
What is the only type of malware that Windows Defender protects against? ANSWER: Spyware
For which of these network types should you have Windows Firewall enabled: Home, Public, Work? ANSWER: All of them
If you allow a certain program through a firewall, what are you making? ANSWER: An exception
What is the name of the day when Windows Updates are released? ANSWER: Patch Tuesday
What device is used to connect networks with each other? ANSWER: Router
Name three of the most commonly used (and insecure) passwords. POSSIBLE ANSWERS: 123456, password, qwerty, letmein, welcome, dragon, iloveyou
Your lights can be turned on by an app, your refrigerator reminds you to buy milk, you can look at your home security camera from your phone…what do we call this? ANSWER: The Internet of Things
Which of these four words does not have the same meaning as the other three: virtual machine, snapshot, image, guest. ANSWER: Snapshot
Name a limitation or downside of virtual machines. ANSWER: Performance depends on host machine, have a single point of failure, pull resources from the host
If you enable complexity requirements, how many types of characters must users have in their passwords? ANSWER: Three
How many old passwords should you set your computer to remember? ANSWER: Five