Email Security Threats and Best Practices Quiz

Email Security Threats and Best Practices Quiz

University

13 Qs

quiz-placeholder

Similar activities

Week 1_Power Generation, Transmission, Distribution and Supply

Week 1_Power Generation, Transmission, Distribution and Supply

University

10 Qs

Nature of Science

Nature of Science

University

10 Qs

Integrating subjects

Integrating subjects

1st Grade - Professional Development

10 Qs

Emotional Intelligence - Concept

Emotional Intelligence - Concept

University

10 Qs

Cell structures and function 2.1-2.2

Cell structures and function 2.1-2.2

University

15 Qs

KM (Rheuma/Ortho) Part 1

KM (Rheuma/Ortho) Part 1

University

10 Qs

Human Flourishing in terms of Science and Technology

Human Flourishing in terms of Science and Technology

University

10 Qs

Histology chapter 7/8 quiz

Histology chapter 7/8 quiz

University

10 Qs

Email Security Threats and Best Practices Quiz

Email Security Threats and Best Practices Quiz

Assessment

Quiz

Science

University

Practice Problem

Hard

Created by

Anonymous Anonymous

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes "phishing emails" as a type of email security threat?

A form of email fraud where cybercriminals impersonate reputable entities to gain access to sensitive information.

A type of email-borne threat that blocks access to files until a ransom is paid.

A fabricated email header to make it look like it came from a trusted source.

A broad category of threats that delivers software to damage systems.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of ransomware in email security threats?

To impersonate reputable entities and steal information.

To block access to important files until a sum of money is paid.

To deliver software that damages systems.

To fabricate email headers to trick users.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a recommended email security tip?

Always click on links in emails to verify their authenticity.

Call the phone number provided in suspicious emails.

Be suspicious of emails that urge you to take action or have an alarmist tone.

Reply to emails that ask for personal information.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why should you hover your mouse over links in emails before clicking them?

To determine the full address and check if it is legitimate.

To make the email look more important.

To automatically scan the link for viruses.

To reply to the sender with your information.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attachment is commonly seen in malicious email campaigns?

Compressed .zip/.rar files that can fool your anti-virus.

PDF files from known contacts.

Images of company logos.

Official documents from your employer.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user receives an email with an attachment named "invoice" from an unknown sender. What should the user do according to email security tips?

Open the attachment to check if it is important.

Reply to the sender asking for more details.

Be cautious and avoid opening the attachment.

Forward the email to colleagues.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main risk of email spoofing?

Attackers fabricate email headers to make emails appear from trusted sources, tricking individuals into divulging sensitive information.

Attackers block access to files until a ransom is paid.

Attackers send emails with malicious attachments.

Attackers use strong passwords to access accounts.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?