Search Header Logo

Phishing Fundamentals

Authored by Ryan Age

Professional Development

Professional Development

Used 9+ times

Phishing Fundamentals
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What should you do if you receive a text message like this one?

Click the link and claim the prize.

Forward it to a friend so they can claim the prize.

Delete the message.

Respond and ask for more specifics.

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Media Image

Which of the following are red flags in this email?

(Select all that apply.)

Generic greeting.

Bad grammar.

A sense of urgency.

Incorrect punctuation and typos.

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

Imagine receiving this email from your boss. Select the best response.

Fill out the form and wire the money as you've been instructed to do.

Download the form and scan it for viruses, then wire the money.

Call your boss to confirm the request is legitimate.

Delete the email because its probably a scam.

4.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Of the following, which best describe how to avoid getting phished? (Select all that apply.)

Hovering the pointer of your mouse over a link to see where the URL leads.

Verifying that the sender of an email or text message is who t hey say they are.

Staying alert for awkward phrasing and threatening language when receiving emails.

Never divulging sensitive information over the phone unless you are 100% sure the person on the other end is a trustworthy source.

Installing antivirus software on all of your devices.

5.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Select the three (3) true statements about spam.

It can be dangerous but it's mostly annoying.

Spam didn't exist before email became popular.

If you receive a lot of spam at work, you should report it.

To avoid spam in your personal life, you could sign up for opt-out services.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Phishing target __________.

Computers.

Mobile phones.

Network systems.

Humans.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following about phishing is TRUE?

It is one of the uncommon method used by cybercriminals.

It is common only because of smart mobile phones.

There are software out there to detect phishing.

It is one of the most common method used by cybercriminals.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?