How to fight scripting attacks

How to fight scripting attacks

Assessment

Interactive Video

Architecture, Business, Information Technology (IT)

University

Hard

Created by

Quizizz Content

FREE Resource

The video discusses the rise in phishing attacks and the use of malicious macros to compromise networks. It emphasizes the importance of blocking macros, educating users, and maintaining email hygiene to protect against threats. The video also introduces new cloud deployment policies for Microsoft 365, including safe documents and application guard, and suggests managing office licenses based on user risk levels. Finally, it provides guidance on testing these new security features.

Read more

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common technique used by attackers to gain access to networks through office documents?

Using strong passwords

Firewall protection

Malicious macros

Two-factor authentication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to educate end users about email attachments?

To increase email traffic

To ensure they open all attachments

To help them identify potentially unsafe files

To reduce the number of emails they receive

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one of the benefits of having email hygiene in place?

It increases the number of phishing emails

It helps in scanning and filtering out threats

It reduces the need for antivirus software

It allows all emails to be automatically opened

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the 'safe documents' policy in Microsoft 365?

To increase document download speed

To check documents against known risks and threats

To allow all documents to be edited

To disable document sharing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can organizations manage security risks with different office licenses?

By avoiding the use of office applications

By providing the same license to all users

By using only web-based applications

By dividing users based on their risk level and license needs