Email Security Threats and Best Practices Flashcard

Email Security Threats and Best Practices Flashcard

Assessment

Flashcard

Science

University

Hard

Created by

Wayground Content

FREE Resource

Student preview

quiz-placeholder

15 questions

Show all answers

1.

FLASHCARD QUESTION

Front

What are phishing emails?

Back

A form of email fraud where cybercriminals impersonate reputable entities to gain access to sensitive information.

2.

FLASHCARD QUESTION

Front

Which file extensions can emulate a DVD or USB drive and automatically run a script?

Back

.iso, .ism

3.

FLASHCARD QUESTION

Front

What should you do if you receive a suspicious email at work?

Back

Contact BTC Helpdesk at helpdesk@btc.edu

4.

FLASHCARD QUESTION

Front

Which types of files can have malicious macros embedded in them?

Back

Excel and Word documents.

5.

FLASHCARD QUESTION

Front

Why is it important to hover your mouse over links in emails before clicking them?

Back

To determine the full address and check if it is legitimate.

6.

FLASHCARD QUESTION

Front

What is email spoofing?

Back

A technique used by cybercriminals to forge the sender's address on an email to make it appear as if it is from a trusted source.

7.

FLASHCARD QUESTION

Front

What is a ransomware attack?

Back

A type of email-borne threat that blocks access to files until a ransom is paid.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?