A type of phishing attack that targets a senior executive, who is likely to have access to sensitive and valuable company information.
A) Sharking
B) Whaling
C) Spear Phishing
B) Whaling
True or False:
Generic email greetings can be a warning sign of a phishing email.
TRUE
Greetings such as “Dear User” or “Dear Customer” can be a sign that this email was sent to a large number of potential phishing victims, and is not likely to be from a legitimate sender
What type of malware prevents a user from accessing their files, until they make a payment to the cyber criminal?
A) Ransomware
B) Trojan Horse
C) Bot
A) Ransomware
True or False: Phishing attacks will always be blocked by Centre Wellington's IT defenses
FALSE
Even with our many technical defenses, cyber attacks can still sneak through! Users need to be vigilant as our last line of defense against cyber attacks.
What are examples of ways to verify that an email is legitimate?
A) Call the sender on the phone
B) Talk to the sender in person
C) Ask the IT&S department for assistance
D) All of the above
D) All of the above
True or False:
Every cyber attack involves malware
False
Some cyberattacks, such as phishing emails, are only looking to get the user to divulge sensitive data, such as usernames and passwords.
A type of phishing attack that targets specific individuals, requiring the attacked to research their target, and exploit trusted relationships.
A) Spear Phishing
B) SMShing
C) Spying
A) Spear Phishing
True or False?
Poor spelling and grammar is a sign of a phishing email
TRUE
What are some of the consequences of an attacker tricking a user into giving up their username and password:
A) They could sell this login to other hackers on the dark web
B) They could use the login themselves to launch an attack
C) They could sign in with that login, and take actions in the system that would be attributed to the original user
D) All of the above
D) All of the above
What is a phishing attack?
A) An email attack that attempts to gain sensitive information, or trick a user into installing malicious software on their system
B) A type of malware that locks access to user files until they pay a ransom
C) A person who tries to influence someone to take an action that isn't in the best interest of their organization.
A) An email attack that attempts to gain sensitive information, or trick a user into installing malicious software on their system
True or False:
If an email is asking me to take immediate action, this is a sign of legitimacy.
FALSE
Cyber criminals prey upon human emotions to create a sense of urgency and trick us into clicking on a malicious link. Using social engineering, they might try to convince us that something bad will happen if we don’t take action immediately.
What is Social Engineering?
A) The art of influencing someone to take an action that isn’t in their best interest, or the best interest of their organization.
B) A serious cybercrime, punishable by law
C) A type of SMS base cyber attack
A) The art of influencing someone to take an action that isn’t in their best interest, or the best interest of their organization.