Search Header Logo

8.3 Phishing, Pharming, Smishing

Authored by NICOLE YEE

Computers

11th Grade

Used 42+ times

8.3 Phishing, Pharming, Smishing
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

18 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

20 sec • 5 pts

What are the ways of getting other peoples information?

phishing

pharming

smishing

fishing

hacking

2.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

What is phishing?

scams through websites

scam through emails

scam through phone calls

scam through text messages

3.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

If you receive a suspicious email, you should:

open it up and click on any links.

reply to the sender asking them to leave you alone.

delete the email without opening it.

greet the sender and ask for his reasons.

4.

MULTIPLE SELECT QUESTION

20 sec • 5 pts

Your password should contain the following:

letters

numbers

symbols

icons

5.

FILL IN THE BLANK QUESTION

30 sec • 5 pts

What are you learning right now?

6.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

When visiting a website, you notice a lock icon next to the web address. What does the lock represent?

A link to open another site

A webpage that has a secure connection

A program that prevents you from leaving the page

A warning that you are not allowed to view this webpage

7.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

What is smishing?

scams through websites

scams through emails

scams through phone calls

scams through text messages

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers