
8.3 Phishing, Pharming, Smishing
Authored by NICOLE YEE
Computers
11th Grade
Used 42+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
18 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
20 sec • 5 pts
What are the ways of getting other peoples information?
phishing
pharming
smishing
fishing
hacking
2.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
What is phishing?
scams through websites
scam through emails
scam through phone calls
scam through text messages
3.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
If you receive a suspicious email, you should:
open it up and click on any links.
reply to the sender asking them to leave you alone.
delete the email without opening it.
greet the sender and ask for his reasons.
4.
MULTIPLE SELECT QUESTION
20 sec • 5 pts
Your password should contain the following:
letters
numbers
symbols
icons
5.
FILL IN THE BLANK QUESTION
30 sec • 5 pts
What are you learning right now?
6.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
When visiting a website, you notice a lock icon next to the web address. What does the lock represent?
A link to open another site
A webpage that has a secure connection
A program that prevents you from leaving the page
A warning that you are not allowed to view this webpage
7.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
What is smishing?
scams through websites
scams through emails
scams through phone calls
scams through text messages
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?