Cybersecurity Awareness Training: Email and Device Security

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a common characteristic of a fake website used in phishing attacks?

  • Uses professional tone and is error-free
  • Impersonates an official authority or support team
  • Contains a URL that looks similar to the real site but is slightly altered (correct)
  • Contains a hyperlink that leads to a legitimate website

What is a recommended strategy for creating strong passwords?

  • Avoid using a password manager
  • Use easily discoverable information like birthdates or names
  • Use the same password for multiple accounts
  • Combine uppercase and lowercase letters, numbers, and special symbols (correct)

What does 2FA stand for in the context of password security?

  • Two-factor authorization
  • Two-factor authentication (correct)
  • Two-factor analysis
  • Two-factor access

What is the objective of social engineering in cybersecurity?

<p>To gain unauthorized access to systems or sensitive information (B)</p> Signup and view all the answers

How can employees verify the authenticity of emails received?

<p>Check the full email address in the 'From' field (A)</p> Signup and view all the answers

What should employees avoid using in their passwords?

<p>Birthdates, names, or addresses (D)</p> Signup and view all the answers

What does a reliable password manager help with?

<p>Generating and securely storing complex passwords (D)</p> Signup and view all the answers

What is an example of an urgent tactic used in social engineering?

<p>Mentioning an urgent security issue requiring immediate action (B)</p> Signup and view all the answers

What should employees do if they are unsure about a request related to their passwords?

<p>Call the tech department for double check (C)</p> Signup and view all the answers

What is the main focus of cybersafe awareness training?

<p>Email security (D)</p> Signup and view all the answers

What is a common characteristic of phishing emails?

<p>They provide a link leading to a fake website designed to steal login credentials (B)</p> Signup and view all the answers

What action is recommended when receiving a suspicious email attachment?

<p>Double check with the sender by reaching out to them via phone (C)</p> Signup and view all the answers

What is a common characteristic of a phishing email subject line?

<p>Contains a sense of urgency to prompt immediate action (D)</p> Signup and view all the answers

What is a common characteristic of a phishing email sender's domain?

<p>Mimics a legitimate company's domain (e.g., yourbankk.com instead of yourbank.com) (B)</p> Signup and view all the answers

What is the purpose of using generic greetings in phishing emails?

<p>To appear more genuine and personalized (C)</p> Signup and view all the answers

Phishing emails typically create a sense of urgency, request sensitive information, and provide a link leading to a fake website designed to steal login credentials or other personal data.

<p>True (A)</p> Signup and view all the answers

A reliable password manager helps prevent disruption and financial losses in cyber security.

<p>False (B)</p> Signup and view all the answers

Generic greetings, such as 'Dear Valued customer', are a common characteristic of phishing emails.

<p>True (A)</p> Signup and view all the answers

The sender's domain in a phishing email often mimics a legitimate company's domain to appear genuine.

<p>True (A)</p> Signup and view all the answers

Cybersafe awareness training focuses on preventing disruption and financial losses, building trust, and reputation management.

<p>True (A)</p> Signup and view all the answers

Phishing emails often contain hyperlinks that lead to legitimate websites.

<p>False (B)</p> Signup and view all the answers

Employees should validate the senders of suspicious emails by directly reaching out to them via phone calls or other means.

<p>True (A)</p> Signup and view all the answers

It is recommended to include easily discoverable information like birthdates or names in passwords for better memorization.

<p>False (B)</p> Signup and view all the answers

Using a reliable password manager is not advisable for generating secure passwords.

<p>False (B)</p> Signup and view all the answers

Social engineering in cybersecurity primarily exploits technical vulnerabilities rather than human psychology.

<p>False (B)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Cybersecurity Awareness
18 questions

Cybersecurity Awareness

AwestruckRetinalite avatar
AwestruckRetinalite
Cybersecurity Awareness and Training Quiz
18 questions
General Cybersecurity Awareness Quiz
35 questions
Use Quizgecko on...
Browser
Browser