
How to defend Office 365 from spear-phishing attacks
Interactive Video
•
Architecture, Information Technology (IT), Other
•
University
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Read more
5 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common starting point for many cyber attacks, as highlighted in the video?
Malware downloads
Spear phishing emails
Social media scams
Direct hacking attempts
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the described attack, what was the purpose of the ActiveX Flash control?
To activate a command script
To display a warning message
To block unauthorized access
To encrypt user data
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What was the role of the backdoor in the attack sequence?
To collect and upload system information
To install antivirus software
To send spam emails
To delete system files
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which Windows feature can be enabled to help protect against such attacks?
Windows Firewall
Windows Defender System Guard
Windows Backup
Windows Update
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What should users do if they notice unusual events in their email accounts?
Ignore them
Report them to IT
Delete their account
Change their email provider
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?