
Phishing Fundamentals

Quiz
•
Professional Development
•
Professional Development
•
Medium
Ryan Age
Used 9+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What should you do if you receive a text message like this one?
Click the link and claim the prize.
Forward it to a friend so they can claim the prize.
Delete the message.
Respond and ask for more specifics.
2.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following are red flags in this email?
(Select all that apply.)
Generic greeting.
Bad grammar.
A sense of urgency.
Incorrect punctuation and typos.
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Imagine receiving this email from your boss. Select the best response.
Fill out the form and wire the money as you've been instructed to do.
Download the form and scan it for viruses, then wire the money.
Call your boss to confirm the request is legitimate.
Delete the email because its probably a scam.
4.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
Of the following, which best describe how to avoid getting phished? (Select all that apply.)
Hovering the pointer of your mouse over a link to see where the URL leads.
Verifying that the sender of an email or text message is who t hey say they are.
Staying alert for awkward phrasing and threatening language when receiving emails.
Never divulging sensitive information over the phone unless you are 100% sure the person on the other end is a trustworthy source.
Installing antivirus software on all of your devices.
5.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Select the three (3) true statements about spam.
It can be dangerous but it's mostly annoying.
Spam didn't exist before email became popular.
If you receive a lot of spam at work, you should report it.
To avoid spam in your personal life, you could sign up for opt-out services.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Phishing target __________.
Computers.
Mobile phones.
Network systems.
Humans.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following about phishing is TRUE?
It is one of the uncommon method used by cybercriminals.
It is common only because of smart mobile phones.
There are software out there to detect phishing.
It is one of the most common method used by cybercriminals.
Create a free account and access millions of resources
Similar Resources on Wayground
6 questions
E-safety-post session

Quiz
•
Professional Development
12 questions
CyberSecurity

Quiz
•
Professional Development
11 questions
Staff Dig Cit Quiz

Quiz
•
Professional Development
10 questions
Professional Communications Training Quiz

Quiz
•
Professional Development
15 questions
IT Security Awerness

Quiz
•
Professional Development
11 questions
24. Watering Hole Attack Quiz

Quiz
•
Professional Development
10 questions
Pre Test safety Guard Email

Quiz
•
Professional Development
5 questions
GfE PD Series: IT Session 1

Quiz
•
Professional Development
Popular Resources on Wayground
55 questions
CHS Student Handbook 25-26

Quiz
•
9th Grade
10 questions
Afterschool Activities & Sports

Quiz
•
6th - 8th Grade
15 questions
PRIDE

Quiz
•
6th - 8th Grade
15 questions
Cool Tool:Chromebook

Quiz
•
6th - 8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
20 questions
Bullying

Quiz
•
7th Grade
18 questions
7SS - 30a - Budgeting

Quiz
•
6th - 8th Grade
Discover more resources for Professional Development
11 questions
All about me

Quiz
•
Professional Development
10 questions
How to Email your Teacher

Quiz
•
Professional Development
5 questions
Setting goals for the year

Quiz
•
Professional Development
8 questions
Ötzi the Iceman: A 5,000-Year-Old True Crime Murder Mystery | Full Documentary | NOVA | PBS

Interactive video
•
Professional Development