1.1.3 Cybersecurity Email and Social Media

1.1.3 Cybersecurity Email and Social Media

9th - 12th Grade

7 Qs

quiz-placeholder

Similar activities

CamTech Network Security

CamTech Network Security

8th - 12th Grade

12 Qs

ANALISIS DATA

ANALISIS DATA

10th Grade

10 Qs

Internet Security

Internet Security

9th - 11th Grade

10 Qs

Data Security

Data Security

5th - 10th Grade

10 Qs

EmTech Q1 Post Test 1

EmTech Q1 Post Test 1

11th Grade

10 Qs

cyber security

cyber security

9th Grade

11 Qs

Internet Security

Internet Security

9th Grade

10 Qs

cyber safety

cyber safety

9th Grade

11 Qs

1.1.3 Cybersecurity Email and Social Media

1.1.3 Cybersecurity Email and Social Media

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

Robin Robertson

Used 125+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Irrelevant or inappropriate messaging sent through email to a large number of recipients; also known as junk mail.

spam

phishing

phisher

malware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Practice of sending fraudulent emails that appear to be from legitimate companies with the intent to induce people to share sensitive information, such as passwords and credit card numbers.

spam

phishing

phisher

email source

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The person sending the phishing attempts.

spam

phishing

phisher

email source

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The email address from which the email was sent.

top-level domain

phishing

email source

spam

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The last segment of a web address; it follows immediately after the last "dot" symbol (.com, .net, .org, .gov)

spam

phishing

top-level domain

email source

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Software that is intended to do harm or damage.

spam

email source

malware

top-level domain

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A broad category for techniques that aim to psychologically manipulate a person's trust to gain access to data or computing resources, usually by being tricked into clicking on a link, opening a file, or answering a question.

spam

email source

malware

social engineering