
1.1.3 Cybersecurity Email and Social Media
Authored by Robin Robertson
Computers
9th - 12th Grade
Used 129+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Irrelevant or inappropriate messaging sent through email to a large number of recipients; also known as junk mail.
spam
phishing
phisher
malware
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Practice of sending fraudulent emails that appear to be from legitimate companies with the intent to induce people to share sensitive information, such as passwords and credit card numbers.
spam
phishing
phisher
email source
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The person sending the phishing attempts.
spam
phishing
phisher
email source
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The email address from which the email was sent.
top-level domain
phishing
email source
spam
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The last segment of a web address; it follows immediately after the last "dot" symbol (.com, .net, .org, .gov)
spam
phishing
top-level domain
email source
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Software that is intended to do harm or damage.
spam
email source
malware
top-level domain
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A broad category for techniques that aim to psychologically manipulate a person's trust to gain access to data or computing resources, usually by being tricked into clicking on a link, opening a file, or answering a question.
spam
email source
malware
social engineering
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?