Cybersecurity's core function is..
Keeping data secure
Most common type of phishing
Email Phishing
This is the cadence that of our phishing assessments
Quarterly
Voice phishing is called..
Vishing
Cybercriminals motivations in a phishing email (3 answers)
Clicking on a link
Downloading an attachment
Providing sensitive information
4 types of phishing
Vishing
Smshing
Spear
Whaling
HTTPS
What does ROR stand for?
Repeat Offender Report
What does MFA stand for?
Multi Factor Authentication
What month is Cybersecurity Awareness Month
October
Phishing through text messages are called..
Smshing
What is monitored after the assessment is launched
Phishing inbox
Quarantine
Who is the CEO of GM Financial?
Susan Sheffield
Phishing relies on what technique?
Social Engineering
Targeted phishing where attackers focus on a specific individual
Spear phishing
What is whitelisting?
Ensuring the domain name and IP addresses do not get blocked by our security systems
GM Financial was formally known as...
Americredit
Phishing is reponsible for ___ of all successful cyberattacks
90-95%
4 Red flags of a phishing attempt
External Sender
Typos/Bad Grammer
Bad Link
Multiple Recipients
Sense of urgency
Recipient has been Bccd
Who are the parties that are notified after a team member has failed 3 or more times
Team member
Supervisor
First Level Officer
Name one of the four programs that are involved with white listing
Ironport
Proxy
Defender
XSOAR