Search Header Logo

ProofPoint

Authored by Halil BARIS

Computers

Professional Development

Used 3+ times

ProofPoint
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following are NOT typical characteristics of a Phishing email?

 Sense of Urgency

 Action to be taken

Consequences of not responding

Request for payment by cryptocurrency

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is NOT a type of business email compromise (BEC)?

Payroll diversion

Investment scam

 Shipment Redirect

 Gift carding

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of these email headers can NOT be "spoofed"?

 Reply-to

Display Name

From Address

None, they can all be spoofed

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is NOT a type of Phishing attack?

Whaling

Smishing

Vishing

Flossing

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Email can be rejected as Spam if:

The subject line is empty

 The email contains only an image

 The sending IP address is in a list of known bad IP addresses

The email contains a web link

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

 Email is Spam if:

It has an attachment

It contains a weblink

The sender domain was created in the last 24 hours

None of these answers

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

DKIM helps protect against:

 Malicious links in emails

The email "From" address is forged

Malicious Scripts in office documents

Malicious Attachments

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?