1/12
These flashcards focus on key cybersecurity practices, particularly related to email safety, social engineering, and the risks of clicking on suspicious links.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What are common ways cybercriminals manipulate email inquiries?
They use social engineering to obtain information by misrepresenting themselves in phone calls or emails.
What is social engineering in cybersecurity?
A method used to manipulate individuals into divulging confidential or personal information.
What risks are associated with opening attachments from unknown senders?
Attachments may contain malware or ransomware that can compromise your computer.
Why is it problematic to join open WiFi networks?
Open WiFi networks can expose personal information to cybercriminals due to lack of security.
What should you do if you receive an uncertain email with an attachment?
Do not open the attachment and verify the sender's identity first.
What type of spam might include threats about financial consequences?
Phishing emails that claim you owe money or have a bill to pay.
How can curiosity lead to cybersecurity risks?
Curiosity may prompt individuals to click on suspicious links or attachments.
What should you look for in suspicious emails regarding the sender's address?
Ensure the email domain matches known services like Gmail or Outlook.
What is the recommended action if someone asks for information over the phone about your company?
Do not provide any information; direct them to the appropriate designated personnel.
What risks are involved in using free USB drives?
They may contain malware that can infect your computer when plugged in.
What is a common trait of phishing emails?
They often contain urgent prompts or sensational claims to induce quick responses.
How can social engineering be executed through phone calls?
Attackers may impersonate someone familiar to acquire sensitive information.
What is the first step you should take when unsure about an email?
Verify the sender and do not click on any links or attachments.