Across
- 9. Social Engineering methods exploit the _____ _______ of computer security. (two words
- 10. Falcon has placed an _______ ____ on the card due to potential fraud. (two words)
- 11. Agreement Maintenance Path: Relationship Profile > Edit > Edit Person > _______ > Access Services
- 13. Only ___ person should be listed here, they are the person acting for the agreement. (write out the number)
- 15. Immediate ___ changes have to be authorized and done by Team Leads (these are rare occasions)
Down
- 1. ________ _____ use made-up scenarios designed to trick employees into providing the sender with confidential information (two words)
- 2. An __________ is a contract between UCCU and a member that allows the member to access an account electronically.
- 3. If a member’s card is worn out and would like a new card, what button do you click in DNA
- 4. If the card has been lost, stolen, or has fraud, do not reissue the same ____ ______ (two words)
- 5. When a member’s card is lost, stolen or compromised, we fill out what form?
- 6. _______ are sensitive
- 7. How many days does an address need to be on file before ordering a card? (write out the number)
- 8. Pretext callers can ________ caller ID so it appears like the call is coming from inside the credit union
- 12. Please ______ from deleting card agreements!
- 14. Can we return card to ACTIVE status after it has been hot carded?
