Security Awareness

Module 7 – How to spot, and avoid, dangerous attachments (P101-7)


Description

In this module, you will learn how to classify an attachment as either safe, potentially dangerous or downright dangerous. And learn a set of checks that you can make to uncover any signs of a scam in the appearance of the attachment.

Content
  • Module 7 - Introduction
  • 1) In the 2-step safety check, what do you do if a message has signs of a scam?
  • 2) What is the first step in assessing the safety of an attachment?
  • 3) What is the file extension of the following attachment…?
  • 4) Which of the following is not one of the three attachment safety levels?
  • 5) How many different categories of safe file are there?
  • 6) How do scammer’s weaponise a potentially dangerous file?
  • 7) How confident should you be in the legitimacy of a link before clicking it?
  • 8) Which files can be made malicious by scammers?
  • 9) Which of the following statements is NOT true?
  • 10) When is it always OK to open a file that is attached to a message?
  • 11) Which of the following file types is not downright dangerous?
  • 12) How do you know if a file is downright dangerous?
  • 13) Under what circumstances is it OK to skip all safety checks?
  • 14) If you see instructions telling you that you need to enable something…
  • 15) If you are being asked if you ‘trust the document?’ or ‘trust the site?’ ...
  • 16) If you receive a security warning when opening a file or document...
  • 17) What should you do if you receive a message with a personalised attachment?
  • 18) Based on the file’s extension, what is the safety-level of the file below?
  • 19) How do you know if a potentially dangerous file has been made malicious?
  • Module 7 - The Test
  • 20) You're done!
Completion rules
  • All units must be completed
  • Leads to a certification with a duration: Forever
Prerequisites