
Phishing Attacks
Authored by Aaron Howard
Other
6th Grade
Used 71+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
13 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Phishing attacks are mainly using links (shortened URLS) to get you to give them...
money
coffee
personal information
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
True or False: Phishing attacks are NOT common
True
False
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What percentage of people were unable to IDENTIFY sophisticated (advanced) phishing email attacks?
15%
25%
57%
97%
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Targeted attacks that focus on ONE person are called __________ phishing.
ninja
spear
sword
big
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What 2 places do scammers commonly use information from to create targeted spear phishing attacks? [Choose 2]
Social Media
Identification Cards
Online public records
Libraries
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What made Mike McFly (and others) easy to target for a spear phishing attack?
Uses Facebook
Uses Social Media
Privacy settings allows anyone AND everyone to know where he is and what he is doing.
Doesn't like coffee
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
True or False: The spear phishing attack targeted one of Mike McFly's coworkers, not Mike McFly.
True
False
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?