Drill #7 Flashcards

1
Q

Phishing Security Test (PST):

A

A simulated phishing attack performed by KnowBe4 on email addresses an organization provides us. The purpose of the test is to see how prone the organization’s employees are to click on phishing links.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Phishing Reply Test (PRT):

A

A simulated phishing attack similar to PST except there are no links or attachments in the email. PRT is looking to see who will reply to the phishing email by impersonating a trusted source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Social Media Phishing Test (SPT):

A

A simulated phishing attack similar to the PST and the PRT. The purpose of this test is to see which users are likely to fall for social media related phishing attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Automated Security Awareness Program (ASAP):

A

A tool that simplifies the process of creating customized Security Awareness Programs.

How it works: The user completes a questionnaire about their organization and goals. ASAP then generates a custom plan based on the user’s specific needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Breached Password Test (BPT):

A

A tool that checks to see if an organization’s users are currently using passwords that are in publicly available breaches associated with the org’s domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Phish Alert Button (PAB):

A

An email plugin that gives users a safe way to handle actual or potential phishing emails.

How it works: PAB forwards the suspect email to the organization’s security team for analysis. It also deletes the email from the user’s inbox, to prevent future exposure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Email Exposure Check Pro (EEC Pro):

A

Identifies the at-risk users in an organization by searching business social media information and hundreds of data breach databases.

The EEC Pro works in two stages:
Stage 1: Does deep web searches to find any publicly available organizational data. This shows what an organizational structure looks like to an attacker.
Stage 2: Finds any users that have had their email account information exposed in any of several hundred data breaches. These users are particularly at risk because an attacker knows more about that user, up to and including their actual passwords!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Domain Spoof Test (DST):

A

A test that checks a domain name—for example, knowBe4.com—to see if it can be spoofed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Mailserver Security Assessment (MSA):

A

Tests a user’s mailserver configuration to check the effectiveness of the mail filtering rules.

MSA gives the user a quick insight at how their mailserver handles test messages that contain a variety of different message types, email with attachments, or emails with spoofed domains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ransomware Simulator (RanSim):

A

Simulates 13 ransomware infection scenarios to determine if a user’s workstation is vulnerable to infection. RanSim also allows users to see if their antivirus software is incorrectly blocking files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Second Chance:

A

A tool that checks links originated in email messages, including embedded links within attached Office Documents and PDFs. It asks the user if they’re sure they want to follow the link, giving them a second chance to evaluate the link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

USB Drive Test:

A

A tool that finds out how users react to unknown USB drives. The purpose is to see how many users will pick up the USB drive, plug them into their computer, and open files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Weak Password Test (WPT):

A

Checks an organization’s Active Directory for several different types of weak password related threats.

How it works: Once the test is complete, it generates a report of the users who have weak passwords. It does not report the actual passwords of the users; rather it highlights which ones should be addressed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Domain Doppelgänger (DD):

A

Look-alike domains can be a dangerous vector for phishing attacks. The Domain Doppelgänger tool makes it easy for admins to identify their potential “evil domain twins.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Password Exposure Test (PET):

A

A tool that checks if an organization’s users have exposed emails publicly available on the web and checks the organization’s Active Directory to see if they are using weak or compromised passwords that are part of a known data breach.

How it works: First, PET checks to see if any of the organization’s email addresses have been a part of a data breach. Then, it tests against 10 types of weak password related threats associated with user accounts. Finally, it checks if any breached or weak passwords are currently in use in the Active Directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Multi-factor Authentication Security Assessment (MASA):

A

A tool that allows you to check the vulnerability of an organization’s current MFA (Multi-Factor Authentication) solution through a series of questions about how the organization uses MFA and their environment.