Email Security Threats and Best Practices Quiz

Email Security Threats and Best Practices Quiz

University

13 Qs

quiz-placeholder

Similar activities

HIPAA Security and Privacy Training

HIPAA Security and Privacy Training

12th Grade - University

15 Qs

JRG Lab Notebook Preface Quiz

JRG Lab Notebook Preface Quiz

University

10 Qs

Orientation and directional terms (Anatomy)

Orientation and directional terms (Anatomy)

9th Grade - University

11 Qs

APK2003 Careers Presentation

APK2003 Careers Presentation

University

15 Qs

Attendance Policy Quiz

Attendance Policy Quiz

University

10 Qs

quiz on general properties of virus and bacteriophage

quiz on general properties of virus and bacteriophage

University

12 Qs

Microbiology - Bacteria

Microbiology - Bacteria

University

15 Qs

The femur canine anatomy

The femur canine anatomy

University

18 Qs

Email Security Threats and Best Practices Quiz

Email Security Threats and Best Practices Quiz

Assessment

Quiz

Science

University

Hard

Created by

Anonymous Anonymous

Used 1+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes "phishing emails" as a type of email security threat?

A form of email fraud where cybercriminals impersonate reputable entities to gain access to sensitive information.

A type of email-borne threat that blocks access to files until a ransom is paid.

A fabricated email header to make it look like it came from a trusted source.

A broad category of threats that delivers software to damage systems.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of ransomware in email security threats?

To impersonate reputable entities and steal information.

To block access to important files until a sum of money is paid.

To deliver software that damages systems.

To fabricate email headers to trick users.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a recommended email security tip?

Always click on links in emails to verify their authenticity.

Call the phone number provided in suspicious emails.

Be suspicious of emails that urge you to take action or have an alarmist tone.

Reply to emails that ask for personal information.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why should you hover your mouse over links in emails before clicking them?

To determine the full address and check if it is legitimate.

To make the email look more important.

To automatically scan the link for viruses.

To reply to the sender with your information.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attachment is commonly seen in malicious email campaigns?

Compressed .zip/.rar files that can fool your anti-virus.

PDF files from known contacts.

Images of company logos.

Official documents from your employer.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user receives an email with an attachment named "invoice" from an unknown sender. What should the user do according to email security tips?

Open the attachment to check if it is important.

Reply to the sender asking for more details.

Be cautious and avoid opening the attachment.

Forward the email to colleagues.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main risk of email spoofing?

Attackers fabricate email headers to make emails appear from trusted sources, tricking individuals into divulging sensitive information.

Attackers block access to files until a ransom is paid.

Attackers send emails with malicious attachments.

Attackers use strong passwords to access accounts.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?