1.
Phishing is:
Correct Answer
B. An online con game tricking people into divulging sensitive information
Explanation
Phishing is an online con game that tricks people into divulging sensitive information. This involves the use of deceptive tactics, such as creating fake websites or sending fraudulent emails, to trick individuals into revealing personal or financial information. The goal of phishing is to steal sensitive data, such as login credentials or credit card details, which can then be used for fraudulent purposes. It is a form of identity fraud that exploits the trust and vulnerability of unsuspecting victims in order to gain unauthorized access to their personal information.
2.
In a phishing scam Identity thieves mainly gather information from users by extending bait in form of a legitimate-looking email leading users to a fake web site that requires users to proivde sensitive information:
Correct Answer
A. True
Explanation
In a phishing scam, identity thieves use a tactic of sending emails that appear to be legitimate in order to deceive users. These emails often contain links to fake websites that are designed to look like the real ones. Once users are directed to these fake websites, they are prompted to provide sensitive information, such as passwords, credit card details, or personal information. This information is then collected by the identity thieves, who can use it for fraudulent purposes. Therefore, the statement "true" is correct as phishing scams indeed involve gathering information from users through bait emails and fake websites.
3.
Signs of a potential phishing email bait include: (Check all that apply)
Correct Answer(s)
B. It tries to evoke an emotional response to a false crisis
C. It uses urgent, business-like language
D. It makes a request of the user’s personal information
Explanation
The correct answer is: it tries to evoke an emotional response to a false crisis, it uses urgent, business-like language, it makes a request of the user’s personal information.
Phishing emails often try to create a sense of urgency or panic in the recipient by evoking an emotional response to a false crisis. They may use urgent, business-like language to make the recipient feel compelled to take immediate action. Additionally, phishing emails commonly make requests for the user's personal information, such as login credentials or financial details, as a means to deceive and exploit the recipient. Therefore, these signs indicate a potential phishing email bait.
4.
When a web address in the email does not match the usual address of the site or login page of the business, it is very likely that the e-mail is from a phishing scam.
Correct Answer
A. True
Explanation
If a web address in an email does not match the usual address of the site or login page of the business, it is highly likely that the email is part of a phishing scam. Phishing scams often involve tricking individuals into providing personal information or login credentials by impersonating a legitimate website or business. By using a different web address, the scammers attempt to deceive the recipient into thinking they are interacting with a legitimate source when in fact they are being targeted for fraudulent purposes. Therefore, the statement is true.
5.
An unusually high number of grammatical mistakes may indicate the email is a phishing scam.
Correct Answer
A. True
Explanation
An unusually high number of grammatical mistakes in an email can be a strong indication that the email is a phishing scam. Phishing scams are often carried out by individuals with limited language skills or those who use automated tools to generate mass emails. These scammers may not pay attention to grammar and spelling, resulting in numerous mistakes in their messages. Therefore, if an email contains a significant number of grammatical errors, it is advisable to be cautious and treat it as a potential phishing attempt.
6.
Similar to phishing, pharming is a scam prompting users to disclose sensitive information.
Correct Answer
A. True
Explanation
Pharming is indeed a scam that tricks users into revealing their sensitive information. It involves redirecting users to fake websites that mimic legitimate ones, with the intention of stealing their personal data. This can be done through various methods, such as DNS cache poisoning or malware. Once on the fake website, users may unknowingly provide their usernames, passwords, credit card details, or other sensitive information, which can then be used for fraudulent purposes. Therefore, the statement is correct in stating that pharming is a scam that prompts users to disclose sensitive information.
7.
What makes a pharming attack more difficult to recongnize is:
Correct Answer
C. Users are not asked to provide any information at all
Explanation
A pharming attack is a type of cyber attack where the attacker redirects users to a fake website that appears to be legitimate. In this attack, users are not asked to provide any information at all, which makes it more difficult to recognize. Unlike phishing attacks where users are typically asked to enter their personal or sensitive information, pharming attacks manipulate the DNS system or use malware to redirect users to the fake website without any interaction required from the user. This lack of user interaction makes it harder for users to detect that they have been redirected to a malicious site, increasing the effectiveness of the attack.
8.
Check all of the correct statements below:
Correct Answer(s)
A. Pages that begin with "http" are not secure.
C. It is not safe to submit sensitive information on the pages that begin with "http".
Explanation
Pages that begin with "http" are not secure because "http" stands for Hypertext Transfer Protocol, which is not encrypted and can be easily intercepted by hackers. Therefore, sensitive information submitted on these pages can be easily accessed by unauthorized individuals. On the other hand, pages that begin with "https" are secure because they use Hypertext Transfer Protocol Secure, which encrypts the data being transmitted, ensuring that it cannot be easily intercepted or accessed by hackers. Hence, it is not safe to submit sensitive information on the pages that begin with "http".
9.
When filling out a form with sensitive information, it is important to verify that:
Correct Answer
D. All of the above
Explanation
When filling out a form with sensitive information, it is important to verify that the web address begins with "https" because this indicates that the connection is secure and encrypted. Additionally, the presence of a picture of a lock in the right bottom corner of the page is another indicator of a secure connection. Lastly, the web page stating that the website is secure provides further assurance that the information will be protected. Therefore, all of the mentioned factors should be checked to ensure the safety of the sensitive information.