Incident Management Response Week2
docx
keyboard_arrow_up
School
Grand Rapids Community College *
*We aren’t endorsed by this school
Course
CYBER SECU
Subject
Information Systems
Date
Jan 9, 2024
Type
docx
Pages
3
Uploaded by ConstableWildcatMaster401
Congratulations! You passed!
Grade received 87.50%
Latest Submission Grade 87.50%
To pass 80% or higher
Go to next item
1.
Question 1
Which three (3) techniques are commonly used in a phishing attack? (Select 3)
0.25 / 1 point
Breaking in to an office at night and installing a key logging device on the victim's computer.
This should not be selected
Incorrect. Perhaps you should review the video Phishing Overview
Make an urgent request to cause the recipient to take quick action before thinking carefully.
Sending an email with a fake invoice that is overdue.
Send an email from an address that very closely resembles a legitimate address.
Correct
Partially correct!
2.
Question 2
You are working as an engineer on the design of a new product your company hopes will be a big seller when you receive an email from someone you do not personally know. The email is addressed
to you and was sent by someone who identifies herself as the VP of your Product division. She wants you to send her a zip file of your design documents so she can review them. While her name is that of the real VP, she explains that she is using her personal email system since her company account is having problems. You suspect fraud. What kind of attack are you likely under?
1 / 1 point
A phishing attack.
A whale attack.
A spear phishing attack.
A man in the middle attack.
Correct
Correct!
3.
Question 3
Phishing attacks are often sent from spoofed domains that look just like popular real domains. Which
brand has been spoofed the most in phishing attacks?
1 / 1 point
Google
Microsoft
IBM
Apple
Correct
Correct!
4.
Question 4
Which feature of this email is a red flag, indicating that it may be a phishing attack and not a legitimate account warning from PayPal?
1 / 1 point
There are spelling errors.
Suspicious attachments
Poor quality layout
There is a hyperlink in the body of the email
Correct
Correct!
5.
Question 5
Which three (3) of these statistics about phishing attacks are real? (Select 3)
1 / 1 point
94% of phishing messages are opened by their targeted users.
76% of businesses reported being a victim of phishing attacks in 2018.
Correct
Partially correct!
Phishing attempts grew 65% between 2017 and 2018.
Correct
Partially correct!
BEC (Business Email Compromise) scams accounted for over $12 billion in losses according the US
FBI.
Correct
Partially correct!
6.
Question 6
Which is the most common type of identity theft?
1 / 1 point
Credit card fraud
Government documents or benefits fraud
Loan or lease fraud
Phone or utility fraud
Correct
Correct!
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help