Business Email Compromise

Business Email Compromise

Assessment

Interactive Video

Information Technology (IT), Architecture, Social Studies

University

Hard

Created by

Quizizz Content

FREE Resource

The video tutorial explains various types of email fraud, including Business Email Compromise (BEC) and CEO fraud, where attackers impersonate executives to manipulate targets into transferring money or sharing sensitive information. It highlights the importance of verifying email domains and following internal control procedures to prevent mandate fraud, a common scam in the UK. The tutorial emphasizes vigilance and proper verification methods to mitigate risks associated with these frauds.

Read more

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common goal of Business Email Compromise (BEC) attacks?

To improve email security

To increase email storage capacity

To defraud companies by impersonating email account owners

To promote a company's products

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a CEO fraud scenario, what might an attacker try to achieve?

Offer a job promotion

Request a meeting with the CEO

Send a company newsletter

Manipulate the target to initiate a wire transfer

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key indicator of a potential CEO fraud email?

The domain name of the sender is similar but not identical to the legitimate one

The email is sent during business hours

The email contains a company logo

The email is written in a formal tone

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is mandate fraud?

A type of phishing attack targeting personal emails

A BEC attack where the attacker requests a change in bank account details

A method to increase email storage

A scam involving fake job offers

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a recommended action if you suspect mandate fraud?

Follow internal control procedures and verify using known contact details

Reply to the email asking for more information

Call the vendor using the contact number in the email

Ignore the email and delete it