Phishing Awareness v4 Quiz

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

U.S.

Army Information Assurance Virtual Training

U.S. Army Information Assurance Virtual Training Classroom

Phishing Awareness v4

WHAT DO YOU WANT TO DO?

The most important part of a URL is the site name.


1 of 1 point
True (Correct!) 1/4
U.S. Army Information Assurance Virtual Training
  True (Correct!)
  False

Phishing is a high-tech scam that uses e-mail or websites to deceive you


into disclosing your __________.
1 of 1 point
  A. credit card numbers
  B. bank account information
  C. Social Security Number
  D. Any of the above (Correct!)
  E. None of the above

Which of the following is a legitimate URL?


1 of 1 point
  A. http://www.957130/amazonorders.com
  B. https://www.citibank.com (Correct!)
  C. http://www.ebay_security@security.com/order_verification
  D. https://www.bankingofamerica.com
  E. All of the above are legitimate URLs

Which of the following is a legitimate e-mail?


1 of 1 point
  A. E-mail from your supervisor asking for your password.
  B. E-mail from your bank asking to verify your account information for fraud
protection reasons.
  C. E-mail from your bank that contains your electronic bank statement. (Correct!)
  D. E-mail from your state government that says to go to their web site to verify
your social security number to receive your refund.
  E. All of the above are legitimate e-mails.

Legitimate companies will not ask for personal or financial information


via e-mail.
1 of 1 point
  True (Correct!)
  False
2/4
U.S. Army Information Assurance Virtual Training

URLs with all numbers for the main part of the address are usually
scams.
1 of 1 point
  True (Correct!)
  False

Phishers will often send you e-mails asking that you update or validate
information.
1 of 1 point
  True (Correct!)
  False

Whale phishing uses personal information to create e-mails or websites


targeting senior leaders or executives with the goal of:
1 of 1 point

  A. gaining personal financial information


  B. gaining access to systems
  C. gaining access to people with inside information
  D. B and C only (Correct!)
  E. None of the above

Phishers may pose as your Internet service provider, bank, online


payment service, and even a government agency.
1 of 1 point
  True (Correct!)
  False

Spear phishing differs from phishing in that the e-mail comes from
someone who appears to be from inside your organization.
1 of 1 point
  True (Correct!)
  False
3/4

You might also like