Phishing Attacks

Phishing Attacks

12th Grade

10 Qs

quiz-placeholder

Similar activities

BGS Music Quiz

BGS Music Quiz

1st - 12th Grade

10 Qs

rubiks cube quiz

rubiks cube quiz

KG - Professional Development

13 Qs

Global Business & the Economy

Global Business & the Economy

12th Grade

13 Qs

TQM Four Pillar

TQM Four Pillar

12th Grade

15 Qs

Trial - Quiz Bowl HS

Trial - Quiz Bowl HS

10th - 12th Grade

10 Qs

Purification & Types of water

Purification & Types of water

1st Grade - Professional Development

15 Qs

T6_Global Issues

T6_Global Issues

1st Grade - Professional Development

14 Qs

First aid

First aid

7th - 12th Grade

10 Qs

Phishing Attacks

Phishing Attacks

Assessment

Quiz

Other

12th Grade

Practice Problem

Hard

Created by

Kevin Clarke

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are some common phishing techniques?

Email phishing, spear phishing, pharming, vishing, and smishing.

Social engineering, Trojan horse, Man-in-the-middle attack

Malvertising, Ransomware, Keylogging

Phlashing, Whaling, Spoofing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you identify phishing emails?

By providing personal or financial information requested in the email

By checking for suspicious email addresses, misspellings or grammatical errors in the email content, requests for personal or financial information, and unexpected attachments or links.

By clicking on all links and attachments in the email

By ignoring any suspicious email addresses or content

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are some preventive measures to avoid phishing attacks?

Ignoring suspicious emails or messages, clicking on unknown links or downloading attachments from unknown sources, using weak passwords, not enabling two-factor authentication, not keeping software and antivirus programs up to date, and not educating oneself about phishing techniques and how to identify them.

Being cautious of suspicious emails or messages, not clicking on unknown links or downloading attachments from unknown sources, regularly updating and using strong passwords, enabling two-factor authentication, keeping software and antivirus programs up to date, and educating oneself about phishing techniques and how to identify them.

Clicking on any link or downloading any attachment without verifying the source, using the same password for multiple accounts, not updating software and antivirus programs, and not being aware of common phishing tactics.

Trusting all emails and messages received, clicking on any link or downloading any attachment without hesitation, using simple and easily guessable passwords, not enabling any additional security measures, and not staying informed about the latest phishing scams.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to protect personal information online?

To increase online security, To maintain privacy, To avoid online scams

To prevent identity theft, fraud, and unauthorized access to sensitive data.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a phishing attack?

To spread malware and viruses.

To gain unauthorized access to a system.

To deceive individuals into revealing sensitive information.

To promote fake products and services.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are some red flags to look out for in phishing emails?

Suspicious sender email addresses, generic greetings, urgent or threatening language, requests for personal information, spelling and grammatical errors, and suspicious attachments or links.

Emails from unrecognized or suspicious domains, offers that seem too good to be true, requests for password or login credentials, emails that claim to be from a government agency or financial institution

Vague or generic email content, excessive use of exclamation marks or capital letters, requests for immediate action or response, poor formatting or design

Unusual email subject lines, unfamiliar sender names, requests for money or financial information, misspelled company names or logos

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you verify the authenticity of a website to prevent phishing attacks?

Ignore any security warnings from your browser.

Click on any pop-up ads on the website to verify its authenticity.

Check for spelling errors in the website URL.

Verify HTTPS, SSL certificate, trust indicators, domain name, and be cautious of suspicious emails or links.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?