5.6 Security Awareness Flashcards

(19 cards)

1
Q

What is the purpose of running a phishing campaign within a company?

A

To determine how many employees would click a phishing link in a corporate email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can a company execute a phishing campaign?

A

By sending emails to the user community and tracking who clicks on the emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of report does an automated phishing system provide?

A

Reports on opens, clicks, and any interaction with the phishing email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What happens if a user clicks on a phishing link?

A

They receive an automated email informing them of their mistake and may need to undergo additional training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What should users look for to recognize phishing emails?

A

Spelling or grammatical errors, inconsistencies in the domain name, unusual attachments, and requests for personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the ideal function of an email filter regarding phishing attempts?

A

To block phishing attempts before they reach a user’s inbox.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What should users know about clicking links and running attachments in emails?

A

They should never click links or run attachments from inside an email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the process for reporting suspected phishing emails?

A

There should be a well-known process for reporting to the IT security team.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is ‘Anomalous behavior recognition’?

A

Identifying unusual behavior on a user’s workstation that may indicate security risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What types of risky behaviors might be monitored?

A
  • Modifying a host file
  • Replacing core operating system files
  • Uploading sensitive files
  • Unexpected logins from different countries
  • Increased data transfers
  • Unintentional mistakes like typing the wrong domain
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is required for a security team to be aware of anomalous behaviors?

A

Constant monitoring and reporting of security events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What should be included in automated reporting for security metrics?

A
  • Phishing click rates
  • Password manager adoption
  • Multifactor authentication use
  • Other important security metrics
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the goal after a user clicks a phishing link?

A

To provide user training to make them aware of the issue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the role of the security awareness team?

A

To monitor, report, and train users on security issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What types of materials can the security team create to inform users about security issues?

A
  • Emails
  • Posters
  • Customized training based on job function
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can the security awareness team track the effectiveness of their training efforts?

A

By using automated reporting systems to create detailed metrics.

17
Q

What should the training materials created by the security awareness team address?

A

IT security and compliance requirements.

18
Q

Where might you find evidence of a company’s security awareness efforts?

A

In office buildings through classroom training, posters, and information about security concerns.

19
Q

What is the importance of correlating training efforts to overall security?

A

To assess the effectiveness of security measures and identify areas needing emphasis.