Drill #7 Flashcards
Phishing Security Test (PST)
A simulated phishing attack to see how prone the organization’s employees are to click on phishing links.
Phishing Reply Test (PRT)
A simulated phishing attack to see who will reply to a phishing email
Social Media Phishing Test (SPT)
A simulated phishing attack to see which users are likely to fall for social media related phishing attacks.
Automated Security Awareness Program (ASAP)
A tool for creating Security Awareness Programs.
Breached Password Test (BPT)
A tool that checks to see if an organization’s users are currently using passwords that are in publicly available breaches
Phish Alert Button (PAB)
An email plugin that gives employees the ability to report potential phishing emails.
Email Exposure Check Pro (EEC Pro)
Identifies the at-risk users in an organization by searching business information available on the internet and hundreds of data breach databases.
Domain Spoof Test (DST)
A test that checks a domain name—for example, knowBe4.com—to see if it can be spoofed.
Mailserver Security Assessment (MSA)
Test to check the effectiveness of the email filtering rules.
Ransomware Simulator (RanSim):
Simulates 13 ransomware infection scenarios to determine if a user’s workstation is vulnerable to infection.
Second Chance
A tool that asks the user if they’re sure they want to follow the link in an email, giving them a second chance to evaluate the link.
USB Drive Test
A tool that finds out how users react to unknown USB drives. The purpose is to see how many users will pick up the USB drive, plug them into their computer, and open files.
Weak Password Test (WPT)
Checks an organization’s Active Directory for weak password threats.
Password Exposure Test (PET)
a mix of a EEC and also checks the organization’s Active Directory to see exposed email users are using weak or compromised passwords that are part of a known data breach.
Domain Doppelgänger (DD)
Stage 1: Domain Doppelgӓnger searches for all available and purchased domains that are visually similar to the organization’s domain, and therefore, fit the criteria of one of our Doppelgӓnger domain types.
Stage 2: The admin then tests their end users’ awareness of the dangers of look-alike domains.