The Beginners 2022 Cyber Security Awareness Training Course - Business Email Compromise

The Beginners 2022 Cyber Security Awareness Training Course - Business Email Compromise

Assessment

Interactive Video

Information Technology (IT), Architecture

University

Hard

Created by

Quizizz Content

FREE Resource

The video tutorial explains CEO fraud, also known as Business Email Compromise (BECU), a social engineering attack that has caused significant financial losses. Attackers target organizations with frequent wire transfers, using tactics like email spoofing and urgency to trick employees into transferring money. The tutorial provides examples of fraudulent emails and emphasizes the importance of verification methods, such as phone calls, to prevent such attacks. It also suggests implementing two-person integrity checks and dedicated systems for secure transactions.

Read more

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of a CEO fraud or BECU attack?

To gain access to confidential files

To disrupt company operations

To initiate unauthorized wire transfers

To steal personal information

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which employees are typically targeted by attackers in a BECU attack?

IT support staff

Marketing team members

Human resources personnel

Finance and accounting staff

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do attackers gather intelligence within an organization?

By hacking into social media accounts

By attending company meetings

By monitoring email communications

By conducting surveys

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What tactic do attackers use to make fraudulent emails appear legitimate?

Mimicking email addresses

Adding personal anecdotes

Including company logos

Using complex language

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a sophisticated BECU attack, how do attackers create a sense of urgency?

By threatening legal action

By offering rewards

By using technical jargon

By pretending the sender is unavailable

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a recommended method to verify the authenticity of a wire transfer request?

Replying to the email

Checking the sender's email address

Calling the requester directly

Forwarding the email to IT

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a two-person integrity system?

A system that logs all transactions

A system that monitors network traffic

A system that encrypts emails

A system requiring two people to approve actions