What is the process where an attacker orally tricks a person into revealing information called?
Vishing
The process in which a scammer tries to trick you based on trust is called?
Social Engineering
Using the same password across multiple accounts is risky (True or False).
True
Vendor risk refers to threats from what type of relationship.
Third-party suppliers or partners
What is the full meaning of AI?
Artificial Intelligence
A common sign of a phishing email?
Misspelt or lookalike domain
What is the weakest link?
Humans
A strong password should comprise of what, what, what and what and a strong password should be how many characters long?
Uppercase Character
Lowercase Character
Numbers
Special Characters
Length: 8 Characters minimum - 12 Characters Maximum and above
A common way to assess vendor risk is through what?
Vendor Risk Assessment
What is one way attackers use AI in cybersecurity to trick users?
Using deepfakes
What psychological tactic is used by a scammer to make you respond quickly to a phishing attack?
Urgency
What is the type of social engineering technique which targets specific individuals using personalized details
Spear Phishing
Which is an example of a strong password
1. Jesusislord
2. Password123
3. aisforapple
4. 4St@lav!s7@s
4St@lav!s7@s
Sharing login credentials with vendors without restrictions increases what?
Unauthorized access
What term describes when AI unintentionally reveals sensitive information?
Data leakage / Data Breach
How do you recognize a mail from an external sender?
Through the caution pop-up
Using the name of your loved one, children's name, date of birth or the name of your pet is a good technique to use while setting a password (True / False)
False
Vendors can pose risks if they have access to what type of company data?
Sensitive or confidential information
Sending sensitive data or Information for AI to help process or simplify is a good practice and justifiable since AI is smart and gives fast response (True / False)
False
What is the add-on you use when you receive a phishing mail via your BOI mail?
PhishNotify
The process in which malware encrypts project files, credit documentation, loan servicing records, and monitoring reports, blocking access until a fee is paid is called?
Ransomware
What automated method do attackers use to guess passwords quickly?
Brute-force
The amount of risk a business is willing to take is called what?
Risk Appetite
What do you do when you receive a call that seems suspicious but sounds like the actual person calling?
Verify through a separate channel before trusting the call.