
Tips for conducting effective phishing simulations
Interactive Video
•
Architecture, Information Technology (IT), Other
•
University
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Read more
5 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common unethical practice in phishing simulations?
Offering bonuses in phishing emails
Using complex passwords
Implementing two-factor authentication
Educating users about phishing
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a key change in credential management discussed in the video?
Changing passwords frequently
Adopting passwordless solutions
Using the same password everywhere
Ignoring phishing attacks
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How did attackers adapt their phishing strategies in 2020?
By using outdated themes
By targeting only large organizations
By avoiding email-based attacks
By creating lures based on current events
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a recommended practice for users to verify the safety of links?
Clicking on all links
Using the same password for all accounts
Hovering over links before clicking
Ignoring all emails
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What tool does Microsoft offer for simulating attacks and training users?
Office 365 Security and Compliance Attack Simulator
Google Security Suite
Apple Security Manager
Linux Security Toolkit
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?