
Phishing Attacks
Quiz
•
Other
•
12th Grade
•
Practice Problem
•
Hard
Kevin Clarke
FREE Resource
Enhance your content in a minute
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are some common phishing techniques?
Email phishing, spear phishing, pharming, vishing, and smishing.
Social engineering, Trojan horse, Man-in-the-middle attack
Malvertising, Ransomware, Keylogging
Phlashing, Whaling, Spoofing
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can you identify phishing emails?
By providing personal or financial information requested in the email
By checking for suspicious email addresses, misspellings or grammatical errors in the email content, requests for personal or financial information, and unexpected attachments or links.
By clicking on all links and attachments in the email
By ignoring any suspicious email addresses or content
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are some preventive measures to avoid phishing attacks?
Ignoring suspicious emails or messages, clicking on unknown links or downloading attachments from unknown sources, using weak passwords, not enabling two-factor authentication, not keeping software and antivirus programs up to date, and not educating oneself about phishing techniques and how to identify them.
Being cautious of suspicious emails or messages, not clicking on unknown links or downloading attachments from unknown sources, regularly updating and using strong passwords, enabling two-factor authentication, keeping software and antivirus programs up to date, and educating oneself about phishing techniques and how to identify them.
Clicking on any link or downloading any attachment without verifying the source, using the same password for multiple accounts, not updating software and antivirus programs, and not being aware of common phishing tactics.
Trusting all emails and messages received, clicking on any link or downloading any attachment without hesitation, using simple and easily guessable passwords, not enabling any additional security measures, and not staying informed about the latest phishing scams.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is it important to protect personal information online?
To increase online security, To maintain privacy, To avoid online scams
To prevent identity theft, fraud, and unauthorized access to sensitive data.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of a phishing attack?
To spread malware and viruses.
To gain unauthorized access to a system.
To deceive individuals into revealing sensitive information.
To promote fake products and services.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are some red flags to look out for in phishing emails?
Suspicious sender email addresses, generic greetings, urgent or threatening language, requests for personal information, spelling and grammatical errors, and suspicious attachments or links.
Emails from unrecognized or suspicious domains, offers that seem too good to be true, requests for password or login credentials, emails that claim to be from a government agency or financial institution
Vague or generic email content, excessive use of exclamation marks or capital letters, requests for immediate action or response, poor formatting or design
Unusual email subject lines, unfamiliar sender names, requests for money or financial information, misspelled company names or logos
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can you verify the authenticity of a website to prevent phishing attacks?
Ignore any security warnings from your browser.
Click on any pop-up ads on the website to verify its authenticity.
Check for spelling errors in the website URL.
Verify HTTPS, SSL certificate, trust indicators, domain name, and be cautious of suspicious emails or links.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
13 questions
rubiks cube quiz
Quiz
•
KG - Professional Dev...
10 questions
Lesson 5A Literature review: Criteria in Selecting Literature
Quiz
•
12th Grade
15 questions
Literasi Informasi
Quiz
•
KG - University
15 questions
Test Anxiety Review Practice
Quiz
•
9th - 12th Grade
15 questions
TQM Four Pillar
Quiz
•
12th Grade
10 questions
Trial - Quiz Bowl HS
Quiz
•
10th - 12th Grade
9 questions
St.Francis of Assisi
Quiz
•
5th Grade - University
10 questions
Entrepreneur
Quiz
•
12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
Discover more resources for Other
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
12 questions
Add and Subtract Polynomials
Quiz
•
9th - 12th Grade
13 questions
Model Exponential Growth and Decay Scenarios
Quiz
•
9th - 12th Grade
27 questions
7.2.3 Quadrilateral Properties
Quiz
•
9th - 12th Grade
7 questions
Amoeba Sisters Dihybrid Cross Punnett Square
Interactive video
•
9th - 12th Grade
10 questions
The Holocaust: Historical Overview
Interactive video
•
9th - 12th Grade
10 questions
Key Features of Quadratic Functions
Interactive video
•
8th - 12th Grade
11 questions
Exponent Quotient Rules A1 U7
Quiz
•
9th - 12th Grade
