Search Header Logo
Email Security

Email Security

Assessment

Presentation

Computers

4th Grade

Practice Problem

Medium

Created by

Anonymous Anonymous

Used 8+ times

FREE Resource

9 Slides • 19 Questions

1

media

Email Security

2

3

Word Cloud

What is email security?

4

email Security

A process of preventing email-based cyber attacks and unwanted communications/ Protecting your account

​Protecting inbox from takeover

​Protecting domain from spoofing

Blocking malware delivery

Filtering spam

Stop phishing attacks

5

Multiple Choice

Which of the following is NOT a suggestion made by the security team?

1

Having regular ID card checks

2

Employing extra security staff

3

Putting in more CCTV

4

Offering free meals to students

6

Multiple Choice

Which of the following measures is considered most effective by the security team?

1

Conducting surprise security drills

2

Implementing a biometric access system

3

Increasing the height of perimeter fence

4

Installing more bright lights around campus

7

Multiple Choice

An __________ scans and processes all incoming and outgoing email and makes sure that threats are not allowed in.

1


email gateway

2


email profile picture

3


email username

4

none

8

Multiple Choice

What is the MOST common delivery method for viruses?

1

Facebook

2

WhatsApp

3

Email

4

Poster

9

Multiple Choice

If someone asks for your bank account information, what should you do?

1

Exchange it for money.

2

Don't give it to them.

3


Give it to them.

10

Multiple Choice

Identity theft is a crime in which your private information is stolen and used for ________ activity.

1

Criminal

2

Reporter

3

News

4

Hidden

11

media

Phishing

Fraud

Malware

Email
Interception

Account
Takeover

1

4

3

2

5

Type of Email Attacks

12

Malware

1

Software that is designed to attack, control, and damage a device's security and infrastructure

​Trojan Horse

Viruses

Worms

Spyware

Ransomware

13

14

Multiple Choice

What is malware?

1

A type of bird

2

A type of fish

3

Software designed to harm your computer or steal your information

4

A gardening tool

15

Phishing

2

Scammers use fake websites that resemble legitimate ones to trick users into revealing their personal information.

media
media

16

17

18

Multiple Choice

What kind of attachments might contain malware?

1

PDF files

2

Executable files (e.g., .exe, .bat)

3

Image files

4

Text files

19

Multiple Choice

Keyloggers are a form of ______________.

1

Social engineering

2

Trojan

3

Shoulder surfing

4

Spyware

20

Multiple Choice

How can you identify a phishing email?

1

It contains spelling and grammar errors

2

The email address of the sender looks suspicious

3

It asks for sensitive information like passwords or credit card numbers

4

All of the above

21

Multiple Choice

Which of the following is NOT a common type of malware?

1

Trojan horse

2

Spyware

3

Panda

4

Ransomware

22

Multiple Choice

How do phishers typically contact their targets?

1

Via email, text messages, or phone calls

2

By sending physical letters

3

By appearing at their doorstep

4

Through phone calls only

23

Multiple Choice

What can happen if you fall for a phishing scam?

1

Your personal information could be stolen or misused

2

Your computer will run faster

3

You might receive free gifts

4

You'll become famous

24

Multiple Choice

What is phishing?

1

A popular social media platform

2

A type of fishing technique

3

A fraudulent attempt to obtain sensitive information

4

A type of bird commonly found in coastal regions

25

Multiple Choice

Which action helps protect you from falling victim to phishing attacks?

1

Never click on links or download attachments from unknown senders

2

Share your passwords with friends to keep them safe

3

Respond to emails requesting personal information to avoid penalties

4

Keep your antivirus software turned off for better performance

26

Multiple Choice

Email is often used to spread malware ______________ attacks

1


brute force

2

birthday

3

fraud and phishing

4

Front door

27

Multiple Choice

Which of the following attacks is conducted by posing as a legitimate entity in order to solicit sensitive information from users?

1

Insider

2

Hacking

3

Phishing

4

Fraud

28

Multiple Choice

Phishing is a way of attempting to acquire information. What information does it try to acquire?

Select two answer.

1

Level of education

2

User names and passwords

3

Marital status

4

Credit card details

media

Email Security

Show answer

Auto Play

Slide 1 / 28

SLIDE