
Phishing Simulation Campaign Quiz
Authored by Nivedita Newar
Other
12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
6 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the benefits of running a phishing simulation campaign?
Enhances staff awareness among employees about how phishing attacks work and the tactics used by attackers, making them more vigilant.
Identifies which employees or departments are more vulnerable to phishing, allowing targeted security training.
Regular testing with simulations can improve the speed and effectiveness of the response from both individuals and security teams to actual phishing attempts.
Reduces the risk of data breaches
All of the Above
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What steps should you take when you receive a phishing email?
Open the email and follow any instructions it contains.
Delete the email immediately without reporting it.
Report the email via Report Phish button in your UNSW O365 mailbox.
Forward the email to your colleagues to warn them.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is UNSW’s average percentage of staff that fall for a phishing simulation?
65-80%
30-50%
15-25%
2-5%
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which phishing simulation metrics are reported to UNSW’s IT committee of council and risk committee on a quarterly basis?
Phishing click rate
Phishing report rate
All of the above
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
UNSW Cyber Security Awareness team offers exclusive spear phishing campaign service for departments. Which platform can be used to request this service?
MyIT (myit.unsw.edu.au)
MyCyberHub (cybergovernance.unsw.edu.au)
MyUNSW (my.unsw.unsw.edu.au)
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
There are community benefits of reporting a real phishing email because:
The reported phishing email automatically creates an IT service ticket and assigns it to the Security Operations Team to investigate.
The reported email is automatically sent to the Proofpoint Phish Analyser, which validates a dangerous phishing campaign with high accuracy.
The Security Operations team determines whether the reported phishing email is dangerous and has technology to remove/quarantine the validated phishing email from mailboxes of other recipients of the email.
All of the above.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?