Search Header Logo

Phishing Simulation Campaign Quiz

Authored by Nivedita Newar

Other

12th Grade

Used 1+ times

Phishing Simulation Campaign Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the benefits of running a phishing simulation campaign?

Enhances staff awareness among employees about how phishing attacks work and the tactics used by attackers, making them more vigilant.

Identifies which employees or departments are more vulnerable to phishing, allowing targeted security training.

Regular testing with simulations can improve the speed and effectiveness of the response from both individuals and security teams to actual phishing attempts.

Reduces the risk of data breaches

All of the Above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What steps should you take when you receive a phishing email?

Open the email and follow any instructions it contains.

Delete the email immediately without reporting it.

Report the email via Report Phish button in your UNSW O365 mailbox.

Forward the email to your colleagues to warn them.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is UNSW’s average percentage of staff that fall for a phishing simulation?

65-80%

30-50%

15-25%

2-5%

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which phishing simulation metrics are reported to UNSW’s IT committee of council and risk committee on a quarterly basis?

Phishing click rate

Phishing report rate

All of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

UNSW Cyber Security Awareness team offers exclusive spear phishing campaign service for departments. Which platform can be used to request this service?

MyIT (myit.unsw.edu.au)

MyCyberHub (cybergovernance.unsw.edu.au)

MyUNSW (my.unsw.unsw.edu.au)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

There are community benefits of reporting a real phishing email because:

The reported phishing email automatically creates an IT service ticket and assigns it to the Security Operations Team to investigate.

The reported email is automatically sent to the Proofpoint Phish Analyser, which validates a dangerous phishing campaign with high accuracy.

The Security Operations team determines whether the reported phishing email is dangerous and has technology to remove/quarantine the validated phishing email from mailboxes of other recipients of the email.

All of the above.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?