
The Beginners 2022 Cyber Security Awareness Training Course - Targeted Email Phishing Part I
Interactive Video
•
Information Technology (IT), Architecture, Social Studies
•
University
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Read more
5 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What was one of the red flags in the phishing email sent to John Podesta?
The email was sent from a known contact.
The email contained a suspicious IP address.
The email was written in a foreign language.
The email had no subject line.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What mistake did Charles Delavan make in his response to Sarah Latham?
He forgot to include an attachment.
He sent the email to the wrong person.
He mistakenly called the email legitimate.
He used an incorrect email address.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What security measure was recommended to John Podesta to protect his account?
Using a VPN for all internet activities.
Enabling two-factor authentication.
Changing his email provider.
Deleting all suspicious emails.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What was the purpose of the fake Google page created by the attackers?
To provide a tutorial on password security.
To promote a new Google service.
To collect user feedback on Google features.
To trick users into entering their credentials.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What happened after John Podesta entered his credentials on the fake page?
His credentials were sent to the attackers.
His account was immediately locked by Google.
He was redirected to a news website.
He received a confirmation email from Google.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?