What method do attackers use to disguise phishing emails?
7 dumb ways to be a ransomware victim, and how to avoid the embarrassment

Interactive Video
•
Quizizz Content
•
Architecture, Information Technology (IT)
•
University
•
Hard
Read more
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
As online shopping receipts
As social media notifications
As meeting invites or invoices
As weather alerts
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What tool can expose saved group policy preference passwords?
Microsoft Word
PowerShell command get GPO password PS1
Adobe Acrobat
Google Docs
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common vulnerability associated with Remote Desktop Protocol (RDP)?
It is always encrypted
It is only accessible on weekends
It is often left open to the web
It requires no authentication
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a key strategy to prevent attackers from logging in with stolen passwords?
Enabling multi-factor authentication
Disabling all user accounts
Changing passwords monthly
Using a single-factor authentication
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the netlogon vulnerability also known as?
Zero login
Zero trust
Zero hour
Zero day
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What should be implemented to improve email security against phishing?
Email hygiene programs
Weekly email newsletters
Email forwarding
Email archiving
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a recommended tool to manage and secure passwords?
A password manager program
A text document
A sticky note
A spreadsheet
Similar Resources on Quizizz
6 questions
The Beginners 2022 Cyber Security Awareness Training Course - 2-Factor Authentication Part II

Interactive video
•
University
6 questions
Tips for conducting effective phishing simulations

Interactive video
•
University
4 questions
7 dumb ways to be a ransomware victim, and how to avoid the embarrassment

Interactive video
•
University
2 questions
7 dumb ways to be a ransomware victim, and how to avoid the embarrassment

Interactive video
•
University
6 questions
How to better control access to your Windows network

Interactive video
•
University
6 questions
How to better control access to your Windows network

Interactive video
•
University
6 questions
Fundamentals of Secure Software - Identification and Authentication Failures

Interactive video
•
University
6 questions
How an attacker can target phishing attacks

Interactive video
•
University
Popular Resources on Quizizz
39 questions
Respect and How to Show It

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
10 questions
Human Body Systems and Functions

Interactive video
•
6th - 8th Grade
20 questions
Multiplication Facts

Quiz
•
3rd Grade
Discover more resources for Architecture
20 questions
Summer

Quiz
•
KG - University
19 questions
Minecraft

Quiz
•
6th Grade - Professio...
20 questions
3rd Grade Review

Quiz
•
KG - University
15 questions
Minecraft

Quiz
•
University
52 questions
Logos Trivia

Quiz
•
KG - University
7 questions
New national park celebrates Harriet Tubman's legacy

Interactive video
•
11th Grade - University
8 questions
2 Step Word Problems

Quiz
•
KG - University
20 questions
Disney characters

Quiz
•
KG - Professional Dev...