Cybersecurity Awareness Training: Email and Device Security
25 Questions
3 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a common characteristic of a fake website used in phishing attacks?

  • Uses professional tone and is error-free
  • Impersonates an official authority or support team
  • Contains a URL that looks similar to the real site but is slightly altered (correct)
  • Contains a hyperlink that leads to a legitimate website
  • What is a recommended strategy for creating strong passwords?

  • Avoid using a password manager
  • Use easily discoverable information like birthdates or names
  • Use the same password for multiple accounts
  • Combine uppercase and lowercase letters, numbers, and special symbols (correct)
  • What does 2FA stand for in the context of password security?

  • Two-factor authorization
  • Two-factor authentication (correct)
  • Two-factor analysis
  • Two-factor access
  • What is the objective of social engineering in cybersecurity?

    <p>To gain unauthorized access to systems or sensitive information</p> Signup and view all the answers

    How can employees verify the authenticity of emails received?

    <p>Check the full email address in the 'From' field</p> Signup and view all the answers

    What should employees avoid using in their passwords?

    <p>Birthdates, names, or addresses</p> Signup and view all the answers

    What does a reliable password manager help with?

    <p>Generating and securely storing complex passwords</p> Signup and view all the answers

    What is an example of an urgent tactic used in social engineering?

    <p>Mentioning an urgent security issue requiring immediate action</p> Signup and view all the answers

    What should employees do if they are unsure about a request related to their passwords?

    <p>Call the tech department for double check</p> Signup and view all the answers

    What is the main focus of cybersafe awareness training?

    <p>Email security</p> Signup and view all the answers

    What is a common characteristic of phishing emails?

    <p>They provide a link leading to a fake website designed to steal login credentials</p> Signup and view all the answers

    What action is recommended when receiving a suspicious email attachment?

    <p>Double check with the sender by reaching out to them via phone</p> Signup and view all the answers

    What is a common characteristic of a phishing email subject line?

    <p>Contains a sense of urgency to prompt immediate action</p> Signup and view all the answers

    What is a common characteristic of a phishing email sender's domain?

    <p>Mimics a legitimate company's domain (e.g., yourbankk.com instead of yourbank.com)</p> Signup and view all the answers

    What is the purpose of using generic greetings in phishing emails?

    <p>To appear more genuine and personalized</p> Signup and view all the answers

    Phishing emails typically create a sense of urgency, request sensitive information, and provide a link leading to a fake website designed to steal login credentials or other personal data.

    <p>True</p> Signup and view all the answers

    A reliable password manager helps prevent disruption and financial losses in cyber security.

    <p>False</p> Signup and view all the answers

    Generic greetings, such as 'Dear Valued customer', are a common characteristic of phishing emails.

    <p>True</p> Signup and view all the answers

    The sender's domain in a phishing email often mimics a legitimate company's domain to appear genuine.

    <p>True</p> Signup and view all the answers

    Cybersafe awareness training focuses on preventing disruption and financial losses, building trust, and reputation management.

    <p>True</p> Signup and view all the answers

    Phishing emails often contain hyperlinks that lead to legitimate websites.

    <p>False</p> Signup and view all the answers

    Employees should validate the senders of suspicious emails by directly reaching out to them via phone calls or other means.

    <p>True</p> Signup and view all the answers

    It is recommended to include easily discoverable information like birthdates or names in passwords for better memorization.

    <p>False</p> Signup and view all the answers

    Using a reliable password manager is not advisable for generating secure passwords.

    <p>False</p> Signup and view all the answers

    Social engineering in cybersecurity primarily exploits technical vulnerabilities rather than human psychology.

    <p>False</p> Signup and view all the answers

    More Like This

    Cybersecurity Awareness
    18 questions

    Cybersecurity Awareness

    AwestruckRetinalite avatar
    AwestruckRetinalite
    Cybersecurity Awareness Quiz
    37 questions
    Use Quizgecko on...
    Browser
    Browser