The Beginners 2022 Cyber Security Awareness Training Course - Targeted Email Phishing Part I

The Beginners 2022 Cyber Security Awareness Training Course - Targeted Email Phishing Part I

Assessment

Interactive Video

Information Technology (IT), Architecture, Social Studies

University

Hard

Created by

Quizizz Content

FREE Resource

The video tutorial discusses a phishing email sent to John Podesta during the 2016 elections. It highlights the red flags in the email, the mistake made by IT security, and how to identify phishing links by hovering over them. The tutorial explains the consequences of falling for phishing scams, such as data theft by Russian intelligence. It concludes with a preview of the next video on targeted email phishing.

Read more

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was one of the red flags in the phishing email sent to John Podesta?

The email was sent from a known contact.

The email contained a suspicious IP address.

The email was written in a foreign language.

The email had no subject line.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What mistake did Charles Delavan make in his response to Sarah Latham?

He forgot to include an attachment.

He sent the email to the wrong person.

He mistakenly called the email legitimate.

He used an incorrect email address.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What security measure was recommended to John Podesta to protect his account?

Using a VPN for all internet activities.

Enabling two-factor authentication.

Changing his email provider.

Deleting all suspicious emails.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the purpose of the fake Google page created by the attackers?

To provide a tutorial on password security.

To promote a new Google service.

To collect user feedback on Google features.

To trick users into entering their credentials.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What happened after John Podesta entered his credentials on the fake page?

His credentials were sent to the attackers.

His account was immediately locked by Google.

He was redirected to a news website.

He received a confirmation email from Google.