{"id":9524,"date":"2020-02-02T19:25:16","date_gmt":"2020-02-03T00:25:16","guid":{"rendered":"https:\/\/www.cyberdrip.com\/?page_id=9524"},"modified":"2020-02-02T19:25:16","modified_gmt":"2020-02-03T00:25:16","slug":"suspicious-devices-security-awareness-correct-answers-48347872382100","status":"publish","type":"page","link":"https:\/\/www.cyberdrip.com\/index.php\/suspicious-devices-security-awareness-correct-answers-48347872382100\/","title":{"rendered":"Suspicious devices security awareness correct answers"},"content":{"rendered":"<p><img decoding=\"async\" width=\"84\" height=\"128\" src=\"http:\/\/cyberdrip.wasmer.app\/wp-content\/uploads\/2020\/10\/drip-1.png\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/p>\n<h4><b>Good work!<br \/><\/b>You have successfully completed the training<\/h4>\n<p>\t\t\t<a href=\"https:\/\/cyberdrip.wasmer.app\/suspicious-devices-security-awareness-overview\/\" role=\"button\"><br \/>\n\t\t\t\t\t\tTake the next training program<br \/>\n\t\t\t\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/cyberdrip.wasmer.app\/medialib\/2019\/12\/xpsc-150x150.png\" alt=\"\" loading=\"lazy\" srcset=\"http:\/\/cyberdrip.wasmer.app\/wp-content\/uploads\/2019\/12\/xpsc-1-150x150.png 150w, http:\/\/cyberdrip.wasmer.app\/wp-content\/uploads\/2019\/12\/xpsc-1-460x460.png 460w, http:\/\/cyberdrip.wasmer.app\/wp-content\/uploads\/2019\/12\/xpsc-1-230x230.png 230w, http:\/\/cyberdrip.wasmer.app\/wp-content\/uploads\/2019\/12\/xpsc-1-160x160.png 160w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/p>\n<p style=\"text-align: center;\">\n<p>\n<center><b><br \/>\n    Experience Points<\/b><\/center>\t\t<\/p>\n<h2>Correct Answers:<\/h2>\n<p>\t\t\t\t\t\tCredit Card Skimming<br \/>\n\t\t\t\tUse your eyes, fingers, and your common sense to cut your fraud risk<br \/>\n\t\t\t\t\t\tHidden cameras<br \/>\n\t\t\t\tIdentify if suspicious devices placed before swipe the card<br \/>\n\t\t\t\t\t\tKey Logger<br \/>\n\t\t\t\tIdentify any suspected device connected to computer keyboard<br \/>\n\t\t\t\t\t\tExternal storage devices<br \/>\n\t\t\t\tDo not pickup or plugin unknown external devices<br \/>\n\t\t\t\t\t\tUSB Killer<br \/>\n\t\t\t\tDo not pickup or plug unknown external devices<\/p>\n<figure><img decoding=\"async\" width=\"278\" height=\"279\" src=\"http:\/\/cyberdrip.wasmer.app\/wp-content\/uploads\/2020\/01\/ransomware-1.png\" alt=\"\" loading=\"lazy\" srcset=\"http:\/\/cyberdrip.wasmer.app\/wp-content\/uploads\/2020\/01\/ransomware-1.png 278w, http:\/\/cyberdrip.wasmer.app\/wp-content\/uploads\/2020\/01\/ransomware-1-150x150.png 150w, http:\/\/cyberdrip.wasmer.app\/wp-content\/uploads\/2020\/01\/ransomware-1-230x230.png 230w, http:\/\/cyberdrip.wasmer.app\/wp-content\/uploads\/2020\/01\/ransomware-1-160x160.png 160w\" sizes=\"auto, (max-width: 278px) 100vw, 278px\" \/><\/figure>\n<h3>Ransomware<\/h3>\n<p>Similar to malware, ransomware is used by attackers to extort money from the target individual or organization.<\/p>\n<figure><img decoding=\"async\" width=\"225\" height=\"225\" src=\"http:\/\/cyberdrip.wasmer.app\/wp-content\/uploads\/2020\/01\/phishing-1.png\" alt=\"\" loading=\"lazy\" srcset=\"http:\/\/cyberdrip.wasmer.app\/wp-content\/uploads\/2020\/01\/phishing-1.png 225w, http:\/\/cyberdrip.wasmer.app\/wp-content\/uploads\/2020\/01\/phishing-1-150x150.png 150w, http:\/\/cyberdrip.wasmer.app\/wp-content\/uploads\/2020\/01\/phishing-1-160x160.png 160w\" sizes=\"auto, (max-width: 225px) 100vw, 225px\" \/><\/figure>\n<h3>Phishing<\/h3>\n<p>Designed user to click on dangerous links \u2014 possibly divulging personal information, even financial information. <\/p>\n<figure><img decoding=\"async\" width=\"804\" height=\"776\" src=\"http:\/\/cyberdrip.wasmer.app\/wp-content\/uploads\/2020\/01\/spam-mail-1.jpg\" alt=\"\" loading=\"lazy\" srcset=\"http:\/\/cyberdrip.wasmer.app\/wp-content\/uploads\/2020\/01\/spam-mail-1.jpg 804w, http:\/\/cyberdrip.wasmer.app\/wp-content\/uploads\/2020\/01\/spam-mail-1-300x290.jpg 300w, http:\/\/cyberdrip.wasmer.app\/wp-content\/uploads\/2020\/01\/spam-mail-1-768x741.jpg 768w, http:\/\/cyberdrip.wasmer.app\/wp-content\/uploads\/2020\/01\/spam-mail-1-600x579.jpg 600w\" sizes=\"auto, (max-width: 804px) 100vw, 804px\" \/><\/figure>\n<h3>Spam<\/h3>\n<p>Cyber criminals can even embed password-stealing malware from a simple LinkedIn invitation.<\/p>\n<figure><img decoding=\"async\" width=\"261\" height=\"260\" src=\"http:\/\/cyberdrip.wasmer.app\/wp-content\/uploads\/2020\/01\/ttraining-1.png\" alt=\"\" loading=\"lazy\" srcset=\"http:\/\/cyberdrip.wasmer.app\/wp-content\/uploads\/2020\/01\/ttraining-1.png 261w, http:\/\/cyberdrip.wasmer.app\/wp-content\/uploads\/2020\/01\/ttraining-1-150x150.png 150w, http:\/\/cyberdrip.wasmer.app\/wp-content\/uploads\/2020\/01\/ttraining-1-230x230.png 230w, http:\/\/cyberdrip.wasmer.app\/wp-content\/uploads\/2020\/01\/ttraining-1-160x160.png 160w\" sizes=\"auto, (max-width: 261px) 100vw, 261px\" \/><\/figure>\n<h3>Training<\/h3>\n<p>Our advance programs simulate most highlighted real world threat events. Improve your memory recall.<\/p>\n<h2>Why Security Awareness Training is important to all organizations ?<\/h2>\n<p>Research suggests that most companies have unprotected data and poor cybersecurity practices in place, making them vulnerable to data-loss, data breaches, ransomware and more.<\/p>\n<p>\t\t\t<a href=\"https:\/\/cyberdrip.wasmer.app\/training-programs\/\" role=\"button\"><br \/>\n\t\t\t\t\t\tTraining Programs<br \/>\n\t\t\t\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1000\" height=\"1000\" src=\"http:\/\/cyberdrip.wasmer.app\/wp-content\/uploads\/2019\/12\/get-a-quote-1.png\" alt=\"\" loading=\"lazy\" srcset=\"http:\/\/cyberdrip.wasmer.app\/wp-content\/uploads\/2019\/12\/get-a-quote-1.png 1000w, http:\/\/cyberdrip.wasmer.app\/wp-content\/uploads\/2019\/12\/get-a-quote-1-300x300.png 300w, http:\/\/cyberdrip.wasmer.app\/wp-content\/uploads\/2019\/12\/get-a-quote-1-150x150.png 150w, http:\/\/cyberdrip.wasmer.app\/wp-content\/uploads\/2019\/12\/get-a-quote-1-768x768.png 768w, http:\/\/cyberdrip.wasmer.app\/wp-content\/uploads\/2019\/12\/get-a-quote-1-460x460.png 460w, http:\/\/cyberdrip.wasmer.app\/wp-content\/uploads\/2019\/12\/get-a-quote-1-230x230.png 230w, http:\/\/cyberdrip.wasmer.app\/wp-content\/uploads\/2019\/12\/get-a-quote-1-600x600.png 600w, http:\/\/cyberdrip.wasmer.app\/wp-content\/uploads\/2019\/12\/get-a-quote-1-160x160.png 160w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Good work!You have successfully completed the training Take the next training program Experience Points Correct Answers: Credit Card Skimming Use your eyes, fingers, and your common sense to cut your fraud risk Hidden cameras Identify if suspicious devices placed before swipe the card Key Logger Identify any suspected device connected to computer keyboard External storage [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-9524","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cyberdrip.com\/index.php\/wp-json\/wp\/v2\/pages\/9524","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberdrip.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberdrip.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberdrip.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberdrip.com\/index.php\/wp-json\/wp\/v2\/comments?post=9524"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberdrip.com\/index.php\/wp-json\/wp\/v2\/pages\/9524\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberdrip.com\/index.php\/wp-json\/wp\/v2\/media?parent=9524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}