Week One

123456789101112131415
Across
  1. 9. Social Engineering methods exploit the _____ _______ of computer security. (two words
  2. 10. Falcon has placed an _______ ____ on the card due to potential fraud. (two words)
  3. 11. Agreement Maintenance Path: Relationship Profile > Edit > Edit Person > _______ > Access Services
  4. 13. Only ___ person should be listed here, they are the person acting for the agreement. (write out the number)
  5. 15. Immediate ___ changes have to be authorized and done by Team Leads (these are rare occasions)
Down
  1. 1. ________ _____ use made-up scenarios designed to trick employees into providing the sender with confidential information (two words)
  2. 2. An __________ is a contract between UCCU and a member that allows the member to access an account electronically.
  3. 3. If a member’s card is worn out and would like a new card, what button do you click in DNA
  4. 4. If the card has been lost, stolen, or has fraud, do not reissue the same ____ ______ (two words)
  5. 5. When a member’s card is lost, stolen or compromised, we fill out what form?
  6. 6. _______ are sensitive
  7. 7. How many days does an address need to be on file before ordering a card? (write out the number)
  8. 8. Pretext callers can ________ caller ID so it appears like the call is coming from inside the credit union
  9. 12. Please ______ from deleting card agreements!
  10. 14. Can we return card to ACTIVE status after it has been hot carded?