Phishing Awareness QuizVersión en línea Test your knowledge on phishing and learn how to stay safe online! por tdowers@bosvg.com 1 If you receive a suspicious email claiming to be from your bank, what is the safest first step to take? a Click the link to investigate b Respond to the email asking for clarification c Call the bank directly using a known phone number d Forward the email to your friends for their opinions 2 What sophisticated technique do attackers use in “whaling” attacks that specifically target high-level executives? a Utilizing deepfake technology to impersonate the executive b Crafting personalized emails based on social media analysis c Sending generic mass emails with malicious links d Exploiting known vulnerabilities in corporate software 3 What is the purpose of a "phishing kit"? a A software bundle for secure email communication b A set of tools used by attackers to create and manage phishing campaigns c A training resource for organizations to educate employees d A collection of templates for legitimate business emails 4 Which type of phishing attack employs voice calls to deceive victims into providing sensitive information? a Smishing b Vishing c Spear phishing d Clone phishing 5 What is a key characteristic that differentiates “clone phishing” from standard phishing attacks? a It targets specific organizations only. b It involves the use of previously sent legitimate emails that have been modified. c It utilizes encrypted attachments to evade detection. d It relies on social media platforms for distribution. 6 Which of the following is a common feature of a phishing email? a A professional-looking email signature b Personalization using the recipient's name c Clear contact information for follow-up d Requests for urgent action with a sense of threat or urgency 7 What advanced method might attackers use to bypass email filters and reach their targets? a Sending emails during off-peak hours b Incorporating random symbols and numbers in subject lines c Using HTML to create misleading visual content d Spoofing legitimate domain names to appear more credible 8 In phishing attacks, what role does “domain spoofing” play? a It encrypts phishing content to evade detection. b It allows attackers to create convincing replicas of legitimate websites. c It masks the attacker's IP address during the attack. d It tricks victims into downloading malicious software. 9 What should you check before clicking on a link in an email? a The sender's name only b The email's subject line c The link's destination by hovering over it d The number of recipients in the CC field 10 Which of the following is a common psychological tactic used in phishing emails to prompt immediate action? a Offering incentives that require immediate response b Providing extensive background information c Using detailed technical jargon d Including lengthy terms and conditions 11 What is the purpose of “URL shortening” in phishing attacks? a To make links look more appealing b To bypass corporate email security measures c To hide the actual destination of the link d To ensure faster loading times for fraudulent websites 12 What does “smishing” refer to in the context of phishing attacks? a Phishing attempts via SMS text messages b Phishing attacks that occur through social media c Phishing scams involving voice calls d Phishing emails that use embedded multimedia 13 How can behavioral analysis be leveraged to detect phishing attempts? a By measuring employee engagement with security training b By analyzing the response time to emails c By tracking email open rates across the organization d By monitoring unusual patterns in user login attempts and interactions 14 Which of the following techniques is often used in “baiting” phishing attacks? a Sending unsolicited job offers from fake companies b Impersonating IT support to request passwords c Creating fake social media accounts to gather data d Offering a free download in exchange for personal information 15 Which of the following might indicate a legitimate email, despite being cautious of phishing attempts? a An unexpected request for sensitive information b A detailed explanation of the company's recent changes c An email from a familiar contact with a generic greeting d A link to a new service without context