
Phishing Attacks
Quiz
•
Other
•
12th Grade
•
Practice Problem
•
Hard
Kevin Clarke
FREE Resource
Enhance your content in a minute
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are some common phishing techniques?
Email phishing, spear phishing, pharming, vishing, and smishing.
Social engineering, Trojan horse, Man-in-the-middle attack
Malvertising, Ransomware, Keylogging
Phlashing, Whaling, Spoofing
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can you identify phishing emails?
By providing personal or financial information requested in the email
By checking for suspicious email addresses, misspellings or grammatical errors in the email content, requests for personal or financial information, and unexpected attachments or links.
By clicking on all links and attachments in the email
By ignoring any suspicious email addresses or content
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are some preventive measures to avoid phishing attacks?
Ignoring suspicious emails or messages, clicking on unknown links or downloading attachments from unknown sources, using weak passwords, not enabling two-factor authentication, not keeping software and antivirus programs up to date, and not educating oneself about phishing techniques and how to identify them.
Being cautious of suspicious emails or messages, not clicking on unknown links or downloading attachments from unknown sources, regularly updating and using strong passwords, enabling two-factor authentication, keeping software and antivirus programs up to date, and educating oneself about phishing techniques and how to identify them.
Clicking on any link or downloading any attachment without verifying the source, using the same password for multiple accounts, not updating software and antivirus programs, and not being aware of common phishing tactics.
Trusting all emails and messages received, clicking on any link or downloading any attachment without hesitation, using simple and easily guessable passwords, not enabling any additional security measures, and not staying informed about the latest phishing scams.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is it important to protect personal information online?
To increase online security, To maintain privacy, To avoid online scams
To prevent identity theft, fraud, and unauthorized access to sensitive data.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of a phishing attack?
To spread malware and viruses.
To gain unauthorized access to a system.
To deceive individuals into revealing sensitive information.
To promote fake products and services.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are some red flags to look out for in phishing emails?
Suspicious sender email addresses, generic greetings, urgent or threatening language, requests for personal information, spelling and grammatical errors, and suspicious attachments or links.
Emails from unrecognized or suspicious domains, offers that seem too good to be true, requests for password or login credentials, emails that claim to be from a government agency or financial institution
Vague or generic email content, excessive use of exclamation marks or capital letters, requests for immediate action or response, poor formatting or design
Unusual email subject lines, unfamiliar sender names, requests for money or financial information, misspelled company names or logos
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can you verify the authenticity of a website to prevent phishing attacks?
Ignore any security warnings from your browser.
Click on any pop-up ads on the website to verify its authenticity.
Check for spelling errors in the website URL.
Verify HTTPS, SSL certificate, trust indicators, domain name, and be cautious of suspicious emails or links.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
Sensory Testing
Quiz
•
7th - 12th Grade
15 questions
The Nature of Cybercrime and Cyber Threat Actors
Quiz
•
12th Grade
10 questions
Pangngalan- Uri, Kasarian at kailanan
Quiz
•
1st - 12th Grade
10 questions
Library Quiz, ET-6
Quiz
•
9th - 12th Grade
10 questions
Exercícios - Normalização BDs
Quiz
•
12th Grade
10 questions
What I Know?
Quiz
•
12th Grade
10 questions
The Rise of New Media
Quiz
•
12th Grade
10 questions
TRENDS, NETWORK AND CRITICAL THINKING QUIZ 1
Quiz
•
12th Grade
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
Discover more resources for Other
26 questions
Christmas Movie Trivia
Lesson
•
8th Grade - Professio...
15 questions
Christmas Song Emoji Pictionary
Quiz
•
7th - 12th Grade
20 questions
Christmas Movies
Quiz
•
1st - 12th Grade
55 questions
CHS Holiday Trivia
Quiz
•
12th Grade
20 questions
Christmas Movie Trivia
Quiz
•
9th - 12th Grade
29 questions
christmas facts
Lesson
•
5th - 12th Grade
20 questions
Christmas Trivia
Quiz
•
5th - 12th Grade
20 questions
Stages of Meiosis
Quiz
•
9th - 12th Grade
