Search
Close this search box.
Home » Cyber Security Awareness Training Registration » Cyber Security Awareness Training

Cyber Security Awareness Training

/20

Cyber Security Awareness Training

Please watch the training video to begin.

 

To pass the training, you must answer at least 80% of the answers correctly.
You will presented with part one then, once completed, part two.

You must complete both parts and answer all questions to continue.
Please allow up to 2 hours to complete this training.

 


1 / 20

Criminals committing payment redirection fraud need access to their victim’s mailbox. What techniques do criminals rely on to access the email account of the victim?

2 / 20

You are trying to log into your Office 365 account with your web browser. How you can make sure that the login page is genuine?

3 / 20

Why do cybercriminals target the legal profession? (Select all that apply)

4 / 20

Who is the typical attacker(s) behind a payment redirection fraud?

5 / 20

What is multi-factor authentication?

6 / 20

What are the benefits of password managers (also known as password wallet)? (Select all that apply)

7 / 20

Which one of these are business-grade antivirus software brands? (Select all that apply)

8 / 20

What is Business Email Compromise?

9 / 20

Which communications channels do phishing and social engineering rely on?

10 / 20

What are the possible consequences of being a victim of payment redirection fraud?

11 / 20

Which of the following are the indicators your email account may have been hacked? (Select all that apply)

12 / 20

Which one of these parties can be part of a supply chain attack targeting your legal practice?

13 / 20

Why it is important to raise awareness within staff around security best practices and payment redirection fraud?

14 / 20

Unsolicited emails with Word and PDF documents may contain hidden, executable code that can take over your computer. If the file is opened, the code allows a hacker to access your files and folders, camera, microphone and keystrokes on your keyboard?

15 / 20

What email alternatives could lower the risk of being a victim of Business Email Compromise (BEC) and payment redirection fraud? (Select all that apply)

16 / 20

Which insurance may come with complimentary cybersecurity incident response services?

17 / 20

What should you do if your firm becomes a victim of payment redirection fraud? (Select all that apply)

18 / 20

What is the best definition of a supply chain attack?

19 / 20

A telephone call is a safe way to confirm the bank account details for a funds transfer.

20 / 20

Whom should you educate on a regular basis to keep a healthy level of security awareness around payment redirection fraud?

Your score is

0%