Vendor Procurement Security training

Vendor Procurement Security training

Professional Development

5 Qs

quiz-placeholder

Similar activities

WPS Quiz 2

WPS Quiz 2

Professional Development

10 Qs

Sales Academy Review Game

Sales Academy Review Game

Professional Development

10 Qs

Derecho a la privacidad digital

Derecho a la privacidad digital

Professional Development

6 Qs

.....

.....

Professional Development

8 Qs

Identity Theft

Identity Theft

Professional Development

8 Qs

Cybersecurity Set 1

Cybersecurity Set 1

Professional Development

5 Qs

Phishing Attacks

Phishing Attacks

Professional Development

3 Qs

pakistani snacks

pakistani snacks

KG - Professional Development

6 Qs

Vendor Procurement Security training

Vendor Procurement Security training

Assessment

Quiz

Other

Professional Development

Hard

Created by

Paul Paglinawan

Used 2+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

A technique used by hackers to deceive targets into revealing sensitive information or unknowingly performing harmful actions. This is usually done through emails, SMS, or social media.

Social engineering

Phishing

Farming

BEC

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

  • Type of phishing aimed at high-profile employees, such as executives (CEO, CFO, COO) or senior managers.

Vishing

Smishing

Walling

Whaling

3.

MULTIPLE CHOICE QUESTION

20 sec • 4 pts

______ is a cybercrime where scammer poses as a trusted figure (vendor, C-Level employees, etc.) and uses email to trick someone into sending money or divulging confidential information.

Business Email Compromise

Invoice fraud

Vishing

Vendor Fraud

4.

MULTIPLE CHOICE QUESTION

20 sec • 4 pts

BEC Attack phase that executes the plan to achieve goals by manipulating or pressuring the target to take desired actions.

Pre-attack

Attack Launch

Research phase

None of the choices

5.

MULTIPLE CHOICE QUESTION

20 sec • 2 pts

_________ occurs when a caller deliberately falsified the information transmitted to your caller ID to disguise their identity.

Phishing

Smishing

Call spoofing

Vishing