Cybersecurity and Email Safety

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/12

flashcard set

Earn XP

Description and Tags

These flashcards focus on key cybersecurity practices, particularly related to email safety, social engineering, and the risks of clicking on suspicious links.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

13 Terms

1
New cards

What are common ways cybercriminals manipulate email inquiries?

They use social engineering to obtain information by misrepresenting themselves in phone calls or emails.

2
New cards

What is social engineering in cybersecurity?

A method used to manipulate individuals into divulging confidential or personal information.

3
New cards

What risks are associated with opening attachments from unknown senders?

Attachments may contain malware or ransomware that can compromise your computer.

4
New cards

Why is it problematic to join open WiFi networks?

Open WiFi networks can expose personal information to cybercriminals due to lack of security.

5
New cards

What should you do if you receive an uncertain email with an attachment?

Do not open the attachment and verify the sender's identity first.

6
New cards

What type of spam might include threats about financial consequences?

Phishing emails that claim you owe money or have a bill to pay.

7
New cards

How can curiosity lead to cybersecurity risks?

Curiosity may prompt individuals to click on suspicious links or attachments.

8
New cards

What should you look for in suspicious emails regarding the sender's address?

Ensure the email domain matches known services like Gmail or Outlook.

9
New cards

What is the recommended action if someone asks for information over the phone about your company?

Do not provide any information; direct them to the appropriate designated personnel.

10
New cards

What risks are involved in using free USB drives?

They may contain malware that can infect your computer when plugged in.

11
New cards

What is a common trait of phishing emails?

They often contain urgent prompts or sensational claims to induce quick responses.

12
New cards

How can social engineering be executed through phone calls?

Attackers may impersonate someone familiar to acquire sensitive information.

13
New cards

What is the first step you should take when unsure about an email?

Verify the sender and do not click on any links or attachments.