Phishing
Artificial Intelligence
Online Scams/Social Engineering
Mobile Protection
Safe Email
100

Businesses will ask for your personal information inside of a email. (True or False)

What is False?

100

This committee was recently created at MTY to review all requests for the use of AI in our business.

What is the MTY AI Comittee (AiCommittee@mtygroup.com)?

100

The Goal of Social Engineering

What is tricking people to give up information or access?

100

The first thing you should do When you get a new phone?

A. Take a selfie.

B. Put in my favorite Protective case.

C. Set up a lock screen/password.

What is C. Set up a lock screen/password?

100

It is not safe to e-mail business documents to your home computer to work on them. (True or False)

What is true?

200

The aim of a phishing website is to make you believe that you are on a legitimate site, so that cybercriminals can trick you into providing this

What is personal information?

200

You should avoid entering these types of information when using AI platforms:

A. Personal Identifiable Information (PII)

B. Company, Vendor or Customer name

C. Company proprietary or financial information

D. All of the above

D. All of the above

200

The following practices help reduce your vulnerability to identity theft, except which one? Select the best answer. 

A. Memorizing your bank card and account PINs and passwords and never disclosing them. 

B. Posting personal information to friends and contacts unrestrainedly.

C. Refraining from disclosing personal information over the phone, unless you are sure of the caller’s identity and the legitimacy of the request.

B. Posting personal information to friends and contacts unrestrainedly.

200

All of these are a threat to a mobile device except...

A. Theft

B.  Loss of Power

C. Malware

D. Unsecure Networks

What is B. Loss of Power?

200

A vendor you work with regularly emails to request confidential information. What would you do?

A. Reply to the email with the requested information.

B. Reply to the email asking for more information from the vendor.

C. Call the vendor to verify the request before replying.

What is C. Call the vendor to verify the request before replying?

300

When deciding if an email is a phishing attempt, you should be on the lookout for...

What is poor image formatting or  or weblinks that do not match the sender?

300

This is a potential risk of advanced AI language models like ChatGPT, the generation of misleading or false information.

What is disinformation?

300

Identity thieves use a number of methods to wrongfully obtain personal information. Select all that apply. 

A. Social engineering

B. Hacking computers and databases

C. Social engineering

D. Retrieving documents from mailboxes

E. All of the above.


What is E. All of the above?

300

How often should you update your phone's operating system:

A. Never

B. Once a year is enough

C. As soon as Updates are available

What is c. As soon as Updates are available?

300

The misuse of email systems to send unsolicited mass messages with harmful or commercial content is known as:

A. Spamming

B. Hunting

c. Piggybacking

What is A. Spamming

400

If you receive a suspected phishing email you should...

What is report it by clicking on the "Report Message" button in Outlook?

400

Artificial Intelligence is the process that allows computers to learn and make decisions like humans 

True or False

What is True?

400

The fraudulent practice of sending text messages pretending to be from reputable companies in order to get sensitive information.

What is Smishing?

400

Which of the following help to improve the security of sensitive information on your mobile device if it is lost or stolen? 

A. A screen lock

B. Locator Applications

C. Remote Wipe

What is A. A screen Lock?

400

You can reduce this email-related risk by not clicking on or opening attachments in email messages that were unexpected or from an unknown source.

A. Phishing

B. Hoaxes

C. Malware

D. Spam

What is Malware. C

500

This is the most common characteristic of a phishing email message.

What is it conveys a sense of urgency to trigger an immediate action?

500

What is the name of the ability of machines to perform tasks that are typically associated with human intelligence, such as learning and problem-solving?

What is Artificial intelligence?

500

What is it called when someone pretends to be you by using your private information?

What is "identity theft"?

500

A user has configured their mobile device to unlock with facial recognition. What type of method of securing the mobile device is being used?

Biometric Authentication

500

Select the best answer.

Refrain from including personal or sensitive business information in email messages, unless appropriate security measures are applied, such as encryption. 

A. Phishing

B. Email Etiquette

C. Malware

D. Confidentiality

What is C. Confidentiality