1_1_5 Section 1 – Attacks, Threats, and Vulnerabilities - Social Engineering - Hoaxes
24 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What action did the person take upon receiving an email about winning $850,000 US?

  • Contacted the sender via WhatsApp
  • Clicked on a link in the email
  • Ignored the email (correct)
  • Shared personal information in response to the email
  • What method was suggested in the email to claim the grand prize of $850,000 US?

  • Email correspondence
  • Visiting a particular website
  • WhatsApp contact (correct)
  • Phone call
  • What was the potential risk associated with clicking the 'Update' button on the fake software update page mentioned?

  • Receiving a notification of successful update
  • Accessing official Adobe Flash Player website
  • Receiving a legitimate software update
  • Downloading malware onto the computer (correct)
  • How did the person react to encountering the hoax message about updating Adobe Flash Player?

    <p>Closed the browser immediately</p> Signup and view all the answers

    Where can one find cross-referencing information to verify the legitimacy of unsolicited messages?

    <p>hoaxslayer.net and snopes.com</p> Signup and view all the answers

    What general advice is given in the text to avoid falling victim to internet hoaxes?

    <p>Verify suspicious messages with multiple sources</p> Signup and view all the answers

    What is a hoax in the context of IT security?

    <p>A situation that seems real but is not real at all</p> Signup and view all the answers

    How do many hoaxes tend to get money from victims according to the text?

    <p>By making victims purchase gift cards and send the code information</p> Signup and view all the answers

    What is one of the challenges with stopping a hoax mentioned in the text?

    <p>Being unsure of how the hoax will manifest itself</p> Signup and view all the answers

    How do some hoaxes related to viruses or malware trick victims?

    <p>By making themselves look like malware or viruses without actually infecting the system</p> Signup and view all the answers

    How do hoaxes mentioned in the text often persuade victims to give money?

    <p>By requesting gift card purchases and sharing the code information</p> Signup and view all the answers

    What is a common way that hoaxes attempt to make individuals send money?

    <p>By creating a sense of urgency through gift card purchases</p> Signup and view all the answers

    What is a common method used by hoaxes to get money from victims according to the text?

    <p>Requesting victims to purchase gift cards and share the code information</p> Signup and view all the answers

    What is one of the challenges associated with stopping hoaxes according to the text?

    <p>Predicting the exact form in which the hoax will appear</p> Signup and view all the answers

    What action did the person almost take after receiving the Gmail and WhatsApp contact information in the email?

    <p>Contacted the WhatsApp number</p> Signup and view all the answers

    What is a common tactic used by hoaxers to trick victims into thinking their system is infected with malware?

    <p>Creating pop-ups displaying fake malware infection warnings</p> Signup and view all the answers

    What type of prize was the person informed they had won in the email?

    <p>$850,000 US</p> Signup and view all the answers

    What was the potential purpose of the graphic update page encountered by the person while typing a website address?

    <p>To trick the person into installing malware</p> Signup and view all the answers

    How do many hoaxes attempt to convince victims to send money according to the text?

    <p>Making victims buy gift cards and share the codes</p> Signup and view all the answers

    What type of resource is commonly utilized when individuals fall victim to hoaxes mentioned in the text?

    <p>Gift cards with code information</p> Signup and view all the answers

    Where does the individual recommend cross-referencing unsolicited messages for legitimacy?

    <p>Popular websites like hoaxslayer.net and snopes.com</p> Signup and view all the answers

    How do many hoaxes mentioned in the text try to obtain money from individuals without directly accessing their bank accounts?

    <p>Requesting victims to purchase gift cards and send code information</p> Signup and view all the answers

    What would have potentially happened if the person clicked the 'Update' button on the fake software update page?

    <p>Malware might have been installed on their computer</p> Signup and view all the answers

    What advice is given in the text regarding suspicious internet messages?

    <p>Double check before following through with them</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser