Incident Management Response Week2

docx

School

Grand Rapids Community College *

*We aren’t endorsed by this school

Course

CYBER SECU

Subject

Information Systems

Date

Jan 9, 2024

Type

docx

Pages

3

Uploaded by ConstableWildcatMaster401

Report
Congratulations! You passed! Grade received 87.50% Latest Submission Grade 87.50% To pass 80% or higher Go to next item 1. Question 1 Which three (3) techniques are commonly used in a phishing attack? (Select 3) 0.25 / 1 point Breaking in to an office at night and installing a key logging device on the victim's computer. This should not be selected Incorrect. Perhaps you should review the video Phishing Overview Make an urgent request to cause the recipient to take quick action before thinking carefully. Sending an email with a fake invoice that is overdue. Send an email from an address that very closely resembles a legitimate address. Correct Partially correct! 2. Question 2 You are working as an engineer on the design of a new product your company hopes will be a big seller when you receive an email from someone you do not personally know. The email is addressed to you and was sent by someone who identifies herself as the VP of your Product division. She wants you to send her a zip file of your design documents so she can review them. While her name is that of the real VP, she explains that she is using her personal email system since her company account is having problems. You suspect fraud. What kind of attack are you likely under? 1 / 1 point A phishing attack. A whale attack. A spear phishing attack. A man in the middle attack. Correct Correct! 3. Question 3 Phishing attacks are often sent from spoofed domains that look just like popular real domains. Which brand has been spoofed the most in phishing attacks? 1 / 1 point Google Microsoft IBM Apple Correct Correct! 4. Question 4 Which feature of this email is a red flag, indicating that it may be a phishing attack and not a legitimate account warning from PayPal?
1 / 1 point There are spelling errors. Suspicious attachments Poor quality layout There is a hyperlink in the body of the email Correct Correct! 5. Question 5 Which three (3) of these statistics about phishing attacks are real? (Select 3) 1 / 1 point 94% of phishing messages are opened by their targeted users. 76% of businesses reported being a victim of phishing attacks in 2018.
Correct Partially correct! Phishing attempts grew 65% between 2017 and 2018. Correct Partially correct! BEC (Business Email Compromise) scams accounted for over $12 billion in losses according the US FBI. Correct Partially correct! 6. Question 6 Which is the most common type of identity theft? 1 / 1 point Credit card fraud Government documents or benefits fraud Loan or lease fraud Phone or utility fraud Correct Correct!
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help