Phishing, Malware and Ransomware Awareness
A technique when an attacker sends a link that appears harmless but will lead to a malicious website is called:
A. Clone phishing B. Social engineering C. Link manipulation
Cybercriminals can scan your social media profiles for your "likes" and then send you a custom social media message trying to trick you into clicking a link. This is called:
A. Clone phishing B. Social engineering C. Link manipulation
The fraudulent technique that imitates the characteristics of legitimate websites to mislead the users about the origin of a message is called:
A. Phishing B. Spoofing C. Malware D. Ransomware
There are four common clues that help determine potential danger in the content of a phishing message: (Select all that apply).
A. Threat B. From someone you know C. Request for personal information D. Unreasonable offer E. Unrequested communication
Financial institutions often make appeals to their customers to provide their bank account numbers, credit card details, or login information in emails.
False
Phishing refers to the software program or programs installed on your system without your consent, meant to compromise the privacy, accessibility or integrity of the victim's data, operating system or applications.
False
Link manipulation is the technique when an attacker sends a link that appears harmless but will lead to a malicious website.
True
Receiving an email from a familiar address does not guarantee that it's safe because some malware is spread by taking over the contacts of an infected machine and sending the same malware to all contacts.
True
Spear phishing is a highly targeted phishing attempt.
True
Whaling is a phishing attack specifically targeting an organization's top executives or administrators.
True