How to defend Office 365 from spear-phishing attacks

How to defend Office 365 from spear-phishing attacks

Assessment

Interactive Video

Architecture, Information Technology (IT), Other

University

Hard

Created by

Quizizz Content

FREE Resource

The video discusses a zero-day vulnerability in Adobe Flash used in a spear phishing attack targeting a Russian medical institution. It explains the attack sequence, including the use of a RAR archive and ActiveX Flash control to create a backdoor. The video also covers signs of compromised email accounts and offers mitigation strategies, such as enabling Windows Defender features and using AI for threat detection.

Read more

5 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

What is a spear phishing attack and how does it differ from regular phishing?

Evaluate responses using AI:

OFF

2.

OPEN ENDED QUESTION

3 mins • 1 pt

Describe the sequence of events that occur once a user opens a malicious document from a spear phishing email.

Evaluate responses using AI:

OFF

3.

OPEN ENDED QUESTION

3 mins • 1 pt

What steps can be taken to mitigate the risks associated with spear phishing attacks?

Evaluate responses using AI:

OFF

4.

OPEN ENDED QUESTION

3 mins • 1 pt

What indicators might suggest that an email account has been compromised?

Evaluate responses using AI:

OFF

5.

OPEN ENDED QUESTION

3 mins • 1 pt

What features in Windows 10 can help protect against cyber attacks?

Evaluate responses using AI:

OFF