Test Your Cybersecurity Knowledge with Old Republic Title

You receive an email requesting a change in wiring instructions after a closing, what should you do?
Do exactly what the email says and provide great customer service
Delete it because no one mentioned revised instructions during the closing
Call the sender of the email to immediately confirm if there are changes using a phone number other than the one in the email signature
What are computer cookies?
Circular desserts that come in a variety of flavors such as chocolate chip, peanut butter, and oatmeal raisin.
A small packet of information from a visited web server stored on your system by your computer’s browser.
The things hackers use to break into computer systems or networks without permission with the intent of doing damage.
Dave Smith is a real estate agent with an email address of Davesmith@gmail.com. His client received a spoofed email from him. Which email address was used to send the fraudulent email?
Davesmith@gmail.com
DaveSmitt@mail.com
Both a and b
What is phishing?
The act of catching a fish with a rod
Following the rock band Phish around the country
Sending an email to a user falsely claiming to be from a legitimate person or business in an attempt to scam the user into surrendering personal information.
Goliath National Bank sent you an email requesting that you update your account information immediately or they will need to suspend your account. What should you do?
Login to your account and update it using the link provided in the email message.
Just reply to the email – it’s easier to send your social security number and your birthdate over and ask the bank to update it for you.
Do not click on the link in the email, but rather access your account through a secured website as you normally would.
What is spoofing?
A magic trick
A type of scam where an intruder tries to access a user’s system or information by pretending to be the user.
When an intruder installs a malicious program code that attaches itself to other program files and can replicate itself and infect other systems
What are some things that you can do to practice good cyber hygiene?
Keep antivirus software up-to-date
Don't click suspicious links and use strong passwords
Both a and b
You are protected on the Internet as long as you have a firewall set up. True or False
True
False
If you think that you may have been the victim of a cyberattack what should you do?
Notify the financial institutions involved in the transaction
Contact the local police and file a complaint with the FBI
Both a and b
What is spear phishing?
Designing a security barrier to keep unwanted intruders outside a computer system or network
Catching an individual fish with a spear
An attack that focuses on a single user or department addressed from a legitimate looking person within the company in a position of trust requesting confidential information
{"name":"Test Your Cybersecurity Knowledge with Old Republic Title", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"You receive an email requesting a change in wiring instructions after a closing, what should you do?, What are computer cookies?, Dave Smith is a real estate agent with an email address of Davesmith@gmail.com. His client received a spoofed email from him. Which email address was used to send the fraudulent email?","img":"https://cdn.poll-maker.com/15-653719/spam-filter-istock-000023025022medium.jpg?sz=1200-00837060000866005300"}
Powered by: Quiz Maker