GEP-1 HOW ANNOYING!

GEP-1 HOW ANNOYING!

9th - 12th Grade

13 Qs

quiz-placeholder

Similar activities

The Passive

The Passive

11th Grade

15 Qs

Chapter 2 Vocabulary for Stargirl

Chapter 2 Vocabulary for Stargirl

9th Grade

8 Qs

identity theft

identity theft

11th Grade

8 Qs

READING COMPREHENSION LM

READING COMPREHENSION LM

12th Grade - University

15 Qs

Vocabulary

Vocabulary

10th Grade

10 Qs

Reading Comprehension : Persuasive Text

Reading Comprehension : Persuasive Text

10th Grade

15 Qs

Listening comprehension review questions M7

Listening comprehension review questions M7

9th - 12th Grade

8 Qs

Bullying by butterfly

Bullying by butterfly

9th - 12th Grade

10 Qs

GEP-1 HOW ANNOYING!

GEP-1 HOW ANNOYING!

Assessment

Quiz

English

9th - 12th Grade

Medium

CCSS
L.11-12.6, RI.11-12.10, RI.11-12.8

+13

Standards-aligned

Created by

hendra doy

Used 14+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the best answer!

Which of the following is a type of online attack?

Cyber bullying

Hoax

Phising

Romance scam

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the best answer!

What is a common feature of a phishing attack?

A stranger sends a message to the victim

The victim is subjected to verbal abuse online

The attacker sends a fake message pretending to be a legitimate entity

The victim is targeted in a romantic scam

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the best answer!

Which term refers to the act of tricking someone into giving away their personal information through fraudulent means?

Phising

Attack

Cyber bullying

Hoax

Tags

CCSS.L.11-12.6

CCSS.L.8.6

CCSS.L.9-10.6

CCSS.W.11-12.2D

CCSS.W.9-10.2D

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the correct answer!

What is the term used to describe the act of using the internet to harass, intimidate or threaten someone?

Phishing

Attack

Cyber bullying

Hoax

Tags

CCSS.L.11-12.6

CCSS.L.9-10.6

CCSS.W.11-12.2D

CCSS.W.8.2D

CCSS.W.9-10.2D

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the correct answer!

Which of the following is an example of a social engineering attack?

Phishing

Attack

Cyber bullying

Hoax

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the correct answer!

Which term refers to the act of pretending to be someone else online to gain the trust of another person for fraudulent purposes?

Phishing

Romance scam

Cyber bullying

Hoax

Tags

CCSS.RI.11-12.10

CCSS.RI.6.10

CCSS.RI.7.10

CCSS.RI.8.10

CCSS.RI.9-10.10

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the correct answer!

What is the term used to describe a false story or piece of information that is spread deliberately to deceive people?

Phishing

Romance scam

Cyber bullying

Hoax

Tags

CCSS.RI.11-12.10

CCSS.RI.6.10

CCSS.RI.7.10

CCSS.RI.8.10

CCSS.RI.9-10.10

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?