Product Description
Question 1
Points: 10 out of 10
Would this incident be an example of social engineering?
Receiving a request by phone for your date of birth, home address, and Social Security number to verify your pharmacy’s prescription files.
- yes
- no
Question 2
Points: 10 out of 10
You receive a text message on your cell phone announcing that you have won a valuable gift card at a popular retailer. To claim the card, you need to visit a website.
- Social engineering
- Not social engineering
Question 3
Points: 10 out of 10
You are working as a receptionist at a real estate company. You receive a phone call from one of the agents who asks for the email address of another agent he needs to contact.
- Not social engineering
- Social engineering
Question 4
Points: 10 out of 10
Would this incident be an example of social engineering?
You receive a phone call from the technical support department of a software maker alerting you to a bug in the company’s software, which you have purchased. The tech offers to walk you through the steps required to fix the software on your computer.
- Social engineering
- Not social engineering
Question 5
Points: 10 out of 10
Would this incident be an example of social engineering?
Someone calling to get your full name for an event registration.
- yes
- no
Question 6
Points: 10 out of 10
Which of the following measures is least likely to help you protect your PII?
- logging off or shutting down your computer when it’s not in use.
- locking your computer in the back of your car knowing that your car has an alarm.
- keeping the “remember me” button checked on a social networking site.
Question 7
Points: 10 out of 10
Can the following action be a result of your PII being compromised.
Being denied access to your own bank account online.
- yes
- no
Question 8
Points: 0 out of 10
If messages are being sent from your email account without your knowledge, this is a sign that your computer is infected with
- Identity theft.
- Social engineering.
Question 9
Points: 10 out of 10
Indicate whether the following actions are the actions of a person who will be a victim, or will not be a victim, of phishing attacks.
Clicking on a provided link instead of typing the known Web address into a Web browser. It’s faster and more reliable.
- phishing victim
- not a phishing victim
Question 10
Points: 10 out of 10
Indicate whether the following actions are the actions of a person who will be a victim, or will not be a victim, of phishing attacks.
Deleting the attachment in an unexpected e-mail.
- phishing victim
- not a phishing victim
Question 11
Points: 10 out of 10
Which of the following emails is most likely to involve phishing
- An email containing a clickable url
- An email that goes to your email program’s spam folder
- An email sent to multiple recipients
- An email from someone you know
Question 12
Points: 10 out of 10
Identify whether the following actions pose a risk of becoming a phishing victim or do not pose a risk. Ann receives an email telling here that a friend has sent her an electronic greeting card. She clicks on a rather long url to retrieve the card.
- Risk of becoming a phishing victim
- Not a risk of becoming a phishing victim
Question 13
Points: 10 out of 10
For the next question, indicate whether the actions are good practices or bad practices to safeguard your personally identifiable information. You receive an email whose title line looks suspicious. Which of the following actions is the safest?
- Clicking an “unsubscribe’ link in the email
- Deleting the email without opening
- Putting the site in your spam filter rules so you don’t receive any more emails
- Google the site the email is coming from
Question 14
Points: 10 out of 10
Marina’s personal computer requires a password to get access.
- good practice
- bad practice
Question 15
Points: 10 out of 10
For the next question, indicate whether the actions are good practices or bad practices to safeguard your personally identifiable information. Sierra uses a long pass phrase such as “A stitch in time saves 9” with special characters between the words for her bank account password.
- Good practice
- Bad practice