Virtual Scavenger Hunt Week 4

You’re almost there! Great job! You answered all of the questions from week 3 correctly!

To continue into the final week of the hunt, simply find and fill in the answers to the questions below and submit the form. Once again, your entry will be registered, you’ll get an email confirming your entry and reminding you of your answers, and you will be eligible for the fourth weekly drawing.

The email will explain how to reach the completion page. once the page is available, which will be at 9:00 AM on Monday, October 26th. It will remain open until 5:00PM on October 30th, after which the drawing for the grand prize will be held.

Good luck!

OK, here are the questions for week 4 of the hunt!

    BJ Fogg, PhD, is a renowned behavior scientist whose model of human behavior can be leveraged in the world of security awareness. According to BJ's model, which is explained in detail at behaviormodel.org, behavior happens when motivation, _______, and a prompt all come together at the same moment. According to the website, the model can be summarized with the simple equation B=MAP. What does the letter A denote in the equation?

    Remember the GRC Haystack from last week? The time required to "crack" the example password Horse-Field-Cowgirl-Ride! seemed impossibly huge, but the page warns that the calculator is NOT a ___________________ ________________ _________________.

    Mobile phones are like pocket sized computers and people often use them to access some of their most sensitive data like online banking. Keeping your phone updated is one way to protect yourself. The US Federal Communication Commission (FCC) has an easy to use site to lead users through the process. How many steps are in the FCC Smartphone Security Checker? Please answer with a number.

    STOP. THINK. CONNECT. is a global online awareness campaign to help all digital citizens stay safe and secure online. STOP. THINK. CONNECT. provides tips, resources, and data across a variety of languages to promote safe behaviors. One example of a resource is their Digital Declutter Checklist - on this checklist, how many categories of advisories are presented? Please answer with a number.

    Rachel Tobac is a social engineering expert. As mentioned before, social engineering is the most common way organizations are attacked, whether it is phishing (via email), smishing (via SMS text messages), vishing (via phone calls), or in-person. The YouTube clip below is a CNN Business Report demonstrating Rachel's live phone hacking of a reporter. In the clip, Rachel said it took her how many seconds to obtain the reporter's updated address from calling the furniture store? https://www.youtube.com/watch?v=LYilP-1TwMg
    Please answer with a number.

     

     

    Photo Credit: Photo by Yogesh Pedamkar on Unsplash

    (Visited 18 times, 1 visits today)