Phishing
Social Engineering
Passwords
Vendor Risk
A.I Cyber-safety
100

What is the process where an attacker orally tricks a person into revealing information called?

Vishing

100

The process in which a scammer tries to trick you based on trust is called?

Social Engineering

100

Using the same password across multiple accounts is risky (True or False).

True

100

Vendor risk refers to threats from what type of relationship.

Third-party suppliers or partners

100

What is the full meaning of AI?

Artificial Intelligence

200

A common sign of a phishing email?

Misspelt or lookalike domain

200

What is the weakest link?

Humans

200

A strong password should comprise of what, what, what and what and a strong password should be how many characters long?

Uppercase Character
Lowercase Character
Numbers
Special Characters

Length: 8 Characters minimum - 12 Characters Maximum and above

200

A common way to assess vendor risk is through what?

Vendor Risk Assessment

200

What is one way attackers use AI in cybersecurity to trick users?

Using deepfakes

300

What psychological tactic is used by a scammer to make you respond quickly to a phishing attack?

Urgency

300

What is the type of social engineering technique which targets specific individuals using personalized details

Spear Phishing

300

Which is an example of a strong password

1. Jesusislord

2. Password123

3. aisforapple

4. 4St@lav!s7@s

4St@lav!s7@s 

300

Sharing login credentials with vendors without restrictions increases what? 

Unauthorized access

300

What term describes when AI unintentionally reveals sensitive information?

Data leakage / Data Breach

400

How do you recognize a mail from an external sender?

Through the caution pop-up

400

Which is the correct domain of BOI?

1. bo1.ng

2. boi.org.ng

3. boi.ng

4. boi.com

400

Using the name of your loved one, children's name, date of birth or the name of your pet is a good technique to use while setting a password (True / False)

False

400

Vendors can pose risks if they have access to what type of company data?

Sensitive or confidential information

400

Sending sensitive data or Information for AI to help process or simplify is a good practice and justifiable since AI is smart and gives fast response (True / False)

False

500

What is the add-on you use when you receive a phishing mail via your BOI mail?

PhishNotify

500

The process in which malware encrypts project files, credit documentation, loan servicing records, and monitoring reports, blocking access until a fee is paid is called?

Ransomware

500

What automated method do attackers use to guess passwords quickly?

Brute-force  

500

The amount of risk a business is willing to take is called what?

Risk Appetite 

500

What do you do when you receive a call that seems suspicious but sounds like the actual person calling?

Verify through a separate channel before trusting the call.

M
e
n
u