Phishing
Protect Yourself
Types of Attacks
100

A type of phishing attack that targets a senior executive, who is likely to have access to sensitive and valuable company information.

A) Sharking

B) Whaling

C) Spear Phishing

B) Whaling

100

True or False: 

Generic email greetings can be a warning sign of a phishing email.

TRUE

Greetings such as “Dear User” or “Dear Customer” can be a sign that this email was sent to a large number of potential phishing victims, and is not likely to be from a legitimate sender

100

What type of malware prevents a user from accessing their files, until they make a payment to the cyber criminal? 

A) Ransomware

B) Trojan Horse

C) Bot

A) Ransomware

200

True or False: Phishing attacks will always be blocked by Centre Wellington's IT defenses

FALSE

Even with our many technical defenses, cyber attacks can still sneak through! Users need to be vigilant as our last line of defense against cyber attacks.

200

What are examples of ways to verify that an email is legitimate?

A) Call the sender on the phone

B) Talk to the sender in person

C) Ask the IT&S department for assistance

D) All of the above

D) All of the above

200

True or False: 

Every cyber attack involves malware

False

Some cyberattacks, such as phishing emails, are only looking to get the user to divulge sensitive data, such as usernames and passwords. 

300

A type of phishing attack that targets specific individuals, requiring the attacked to research their target, and exploit trusted relationships. 

A) Spear Phishing

B) SMShing

C) Spying

A) Spear Phishing

300

True or False?

Poor spelling and grammar is a sign of a phishing email


TRUE

300

What are some of the consequences of an attacker tricking a user into giving up their username and password:

A) They could sell this login to other hackers on the dark web

B) They could use the login themselves to launch an attack

C) They could sign in with that login, and take actions in the system that would be attributed to the original user

D) All of the above

D) All of the above

400

What is a phishing attack?

A) An email attack that attempts to gain sensitive information, or trick a user into installing malicious software on their system

B) A type of malware that locks access to user files until they pay a ransom

C) A person who tries to influence someone to take an action that isn't in the best interest of their organization.

A) An email attack that attempts to gain sensitive information, or trick a user into installing malicious software on their system

400

True or False:

If an email is asking me to take immediate action, this is a sign of legitimacy.


FALSE

Cyber criminals prey upon human emotions to create a sense of urgency and trick us into clicking on a malicious link. Using social engineering, they might try to convince us that something bad will happen if we don’t take action immediately.

400

What is Social Engineering?

A) The art of influencing someone to take an action that isn’t in their best interest, or the best interest of their organization.

B) A serious cybercrime, punishable by law

C) A type of SMS base cyber attack

A) The art of influencing someone to take an action that isn’t in their best interest, or the best interest of their organization.

M
e
n
u