CyberSafe Questionnaire
Username
Module 1: What is the primary goal of phishing attacks?
Module 1: Which of the following is a common characteristic of phishing emails?
Module 1: What is the best way to verify the legitimacy of a link in an email?
Module 1: Which type of information is most commonly sought in phishing attacks?
Module 1: What is social engineering?
Module 1: What is the best way to report a phishing attempt?
Module 2: Which type of phishing involves personalized emails to specific individuals?
Module 2: What distinguishes whaling from other forms of phishing?
Module 2: What is smishing?
Module 2: In a spear phishing attack, what makes the email appear legitimate?
Module 2: Which of the following is an example of vishing?
Module 2: What is a key characteristic of spear phishing?
Module 3: How is AI used by attackers in phishing campaigns?
Module 3: Which of the following is a way AI enhances social engineering in phishing?
Module 3: What role does deepfake technology play in AI-enhanced phishing?
Module 3: How can AI be used to defend against phishing attacks?
Module 3: What is a primary challenge in using AI for phishing defense?
Module 3: What is one way deepfake technology can be used in phishing?
Module 4: What should you check when scrutinizing sender information in an email?
Module 4: Why is it important to hover over links before clicking them?
Module 4: What does urgent language in an email often indicate?
Module 4: Why is it important to scrutinize the sender’s email address?
Module 4: Which of the following is a sign of a phishing attempt?
Module 4: What does the presence of grammatical errors often indicate?
Module 5: Which email authentication protocol helps prevent unauthorized senders from impersonating a legitimate domain?
Module 5: What is the purpose of multi-factor authentication (MFA)?
Module 5: What does DMARC do?
Module 5: How do simulated phishing exercises help mitigate human risk?
Module 5: Which defense strategy involves educating employees?
Module 5: How does SPF help in preventing phishing attacks?
Module 6: What is the first phase of the hacking process?
Module 6: Which tool is commonly used for network mapping and service detection during reconnaissance?
Module 6: During the scanning phase, what does vulnerability scanning identify?
Module 6: What is the purpose of the "maintaining access" phase in hacking?
Module 6: Which of the following involves erasing indicators of compromise (IoCs)?
Module 6: What is the ultimate goal of the actions on objectives phase?
Submit Answers
Back to Dashboard