Businesses will ask for your personal information inside of a email. (True or False)
What is False?
This committee was recently created at MTY to review all requests for the use of AI in our business.
What is the MTY AI Comittee (AiCommittee@mtygroup.com)?
The Goal of Social Engineering
What is tricking people to give up information or access?
The first thing you should do When you get a new phone?
A. Take a selfie.
B. Put in my favorite Protective case.
C. Set up a lock screen/password.
What is C. Set up a lock screen/password?
It is not safe to e-mail business documents to your home computer to work on them. (True or False)
What is true?
The aim of a phishing website is to make you believe that you are on a legitimate site, so that cybercriminals can trick you into providing this
What is personal information?
You should avoid entering these types of information when using AI platforms:
A. Personal Identifiable Information (PII)
B. Company, Vendor or Customer name
C. Company proprietary or financial information
D. All of the above
D. All of the above
The following practices help reduce your vulnerability to identity theft, except which one? Select the best answer.
A. Memorizing your bank card and account PINs and passwords and never disclosing them.
B. Posting personal information to friends and contacts unrestrainedly.
C. Refraining from disclosing personal information over the phone, unless you are sure of the caller’s identity and the legitimacy of the request.
B. Posting personal information to friends and contacts unrestrainedly.
All of these are a threat to a mobile device except...
A. Theft
B. Loss of Power
C. Malware
D. Unsecure Networks
What is B. Loss of Power?
A vendor you work with regularly emails to request confidential information. What would you do?
A. Reply to the email with the requested information.
B. Reply to the email asking for more information from the vendor.
C. Call the vendor to verify the request before replying.
What is C. Call the vendor to verify the request before replying?
When deciding if an email is a phishing attempt, you should be on the lookout for...
What is poor image formatting or or weblinks that do not match the sender?
This is a potential risk of advanced AI language models like ChatGPT, the generation of misleading or false information.
What is disinformation?
Identity thieves use a number of methods to wrongfully obtain personal information. Select all that apply.
A. Social engineering
B. Hacking computers and databases
C. Social engineering
D. Retrieving documents from mailboxes
E. All of the above.
What is E. All of the above?
How often should you update your phone's operating system:
A. Never
B. Once a year is enough
C. As soon as Updates are available
What is c. As soon as Updates are available?
The misuse of email systems to send unsolicited mass messages with harmful or commercial content is known as:
A. Spamming
B. Hunting
c. Piggybacking
What is A. Spamming
If you receive a suspected phishing email you should...
What is report it by clicking on the "Report Message" button in Outlook?
Artificial Intelligence is the process that allows computers to learn and make decisions like humans
True or False
What is True?
The fraudulent practice of sending text messages pretending to be from reputable companies in order to get sensitive information.
What is Smishing?
Which of the following help to improve the security of sensitive information on your mobile device if it is lost or stolen?
A. A screen lock
B. Locator Applications
C. Remote Wipe
What is A. A screen Lock?
You can reduce this email-related risk by not clicking on or opening attachments in email messages that were unexpected or from an unknown source.
A. Phishing
B. Hoaxes
C. Malware
D. Spam
What is Malware. C
This is the most common characteristic of a phishing email message.
What is it conveys a sense of urgency to trigger an immediate action?
What is the name of the ability of machines to perform tasks that are typically associated with human intelligence, such as learning and problem-solving?
What is Artificial intelligence?
What is it called when someone pretends to be you by using your private information?
What is "identity theft"?
A user has configured their mobile device to unlock with facial recognition. What type of method of securing the mobile device is being used?
Biometric Authentication
Select the best answer.
Refrain from including personal or sensitive business information in email messages, unless appropriate security measures are applied, such as encryption.
A. Phishing
B. Email Etiquette
C. Malware
D. Confidentiality
What is C. Confidentiality