What should you do if you receive a text message like this one?

Phishing Fundamentals

Quiz
•
Professional Development
•
Professional Development
•
Medium
Ryan Age
Used 9+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Click the link and claim the prize.
Forward it to a friend so they can claim the prize.
Delete the message.
Respond and ask for more specifics.
2.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following are red flags in this email?
(Select all that apply.)
Generic greeting.
Bad grammar.
A sense of urgency.
Incorrect punctuation and typos.
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Imagine receiving this email from your boss. Select the best response.
Fill out the form and wire the money as you've been instructed to do.
Download the form and scan it for viruses, then wire the money.
Call your boss to confirm the request is legitimate.
Delete the email because its probably a scam.
4.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
Of the following, which best describe how to avoid getting phished? (Select all that apply.)
Hovering the pointer of your mouse over a link to see where the URL leads.
Verifying that the sender of an email or text message is who t hey say they are.
Staying alert for awkward phrasing and threatening language when receiving emails.
Never divulging sensitive information over the phone unless you are 100% sure the person on the other end is a trustworthy source.
Installing antivirus software on all of your devices.
5.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Select the three (3) true statements about spam.
It can be dangerous but it's mostly annoying.
Spam didn't exist before email became popular.
If you receive a lot of spam at work, you should report it.
To avoid spam in your personal life, you could sign up for opt-out services.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Phishing target __________.
Computers.
Mobile phones.
Network systems.
Humans.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following about phishing is TRUE?
It is one of the uncommon method used by cybercriminals.
It is common only because of smart mobile phones.
There are software out there to detect phishing.
It is one of the most common method used by cybercriminals.
Create a free account and access millions of resources
Similar Resources on Quizizz
10 questions
Email Basics

Quiz
•
10th Grade - Professi...
10 questions
Online Safety

Quiz
•
Professional Development
10 questions
CSIRP Training

Quiz
•
Professional Development
10 questions
מבדק הצלחה - Gmail

Quiz
•
Professional Development
10 questions
ServiceNow Review

Quiz
•
Professional Development
6 questions
NHO Game

Quiz
•
Professional Development
13 questions
SECURITY AWARENS

Quiz
•
University - Professi...
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
25 questions
SS Combined Advisory Quiz

Quiz
•
6th - 8th Grade
40 questions
Week 4 Student In Class Practice Set

Quiz
•
9th - 12th Grade
40 questions
SOL: ILE DNA Tech, Gen, Evol 2025

Quiz
•
9th - 12th Grade
20 questions
NC Universities (R2H)

Quiz
•
9th - 12th Grade
15 questions
June Review Quiz

Quiz
•
Professional Development
20 questions
Congruent and Similar Triangles

Quiz
•
8th Grade
25 questions
Triangle Inequalities

Quiz
•
10th - 12th Grade