Email Monitoring Flashcards

1
Q

The most common attack vector used to deliver malware or steal credentials.

A

Email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A fraudulent message pretending to be from a trusted source.

A

Phishing email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A phishing attack targeting executives or high-level employees.

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A phishing attack delivered through SMS.

A

Smishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A phishing attack using voice calls.

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A link in an email that redirects the user to a fake login page.

A

Malicious URL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An email with an embedded macro that launches malware upon opening.

A

Malicious attachment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A protocol used to authenticate an email sender’s domain.

A

SPF (Sender Policy Framework)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A protocol that verifies message integrity and domain ownership.

A

DKIM (DomainKeys Identified Mail)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A policy that tells receiving servers how to handle unauthenticated email.

A

DMARC (Domain-based Message Authentication, Reporting & Conformance)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A type of attack where an attacker spoofs the “From” address.

A

Email spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Logs that help detect failed or unusual email authentication attempts.

A

Email server logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The system responsible for filtering spam and scanning messages.

A

Email security gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A tactic where attackers register domains similar to a legitimate one.

A

Domain squatting / Typosquatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The act of analyzing message headers to verify source and path.

A

Header inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Tool used to detect and block malicious links and attachments in emails.

A

Secure Email Gateway (SEG)

17
Q

Signs of compromise include high outbound email volume or replies to unusual addresses.

A

Compromised mailbox

18
Q

A targeted email campaign designed to exploit a specific victim or organization.

A

Spear phishing

19
Q

Alert triggered when internal email forwards are created without approval.

A

Email rule manipulation

20
Q

A threat actor posing as a company executive to trick employees into transferring money.

A

Business Email Compromise (BEC)