Phishing Attacks

Phishing Attacks

12th Grade

10 Qs

quiz-placeholder

Similar activities

Basic First Aid Quiz

Basic First Aid Quiz

12th Grade - University

15 Qs

Cell Phone Vocabulary

Cell Phone Vocabulary

9th - 12th Grade

12 Qs

Ertugrul quiz

Ertugrul quiz

6th Grade - Professional Development

10 Qs

Resume Quiz

Resume Quiz

12th Grade

12 Qs

Quiz 11 (Media Content - Random)

Quiz 11 (Media Content - Random)

12th Grade

10 Qs

PR2: RRL, Conceptual Framework and Methodology

PR2: RRL, Conceptual Framework and Methodology

12th Grade

15 Qs

BCSI AWARENESS

BCSI AWARENESS

KG - Professional Development

15 Qs

Piaget intro SENSORIMOTOR

Piaget intro SENSORIMOTOR

11th - 12th Grade

8 Qs

Phishing Attacks

Phishing Attacks

Assessment

Quiz

Other

12th Grade

Practice Problem

Hard

Created by

Kevin Clarke

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are some common phishing techniques?

Email phishing, spear phishing, pharming, vishing, and smishing.

Social engineering, Trojan horse, Man-in-the-middle attack

Malvertising, Ransomware, Keylogging

Phlashing, Whaling, Spoofing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you identify phishing emails?

By providing personal or financial information requested in the email

By checking for suspicious email addresses, misspellings or grammatical errors in the email content, requests for personal or financial information, and unexpected attachments or links.

By clicking on all links and attachments in the email

By ignoring any suspicious email addresses or content

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are some preventive measures to avoid phishing attacks?

Ignoring suspicious emails or messages, clicking on unknown links or downloading attachments from unknown sources, using weak passwords, not enabling two-factor authentication, not keeping software and antivirus programs up to date, and not educating oneself about phishing techniques and how to identify them.

Being cautious of suspicious emails or messages, not clicking on unknown links or downloading attachments from unknown sources, regularly updating and using strong passwords, enabling two-factor authentication, keeping software and antivirus programs up to date, and educating oneself about phishing techniques and how to identify them.

Clicking on any link or downloading any attachment without verifying the source, using the same password for multiple accounts, not updating software and antivirus programs, and not being aware of common phishing tactics.

Trusting all emails and messages received, clicking on any link or downloading any attachment without hesitation, using simple and easily guessable passwords, not enabling any additional security measures, and not staying informed about the latest phishing scams.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to protect personal information online?

To increase online security, To maintain privacy, To avoid online scams

To prevent identity theft, fraud, and unauthorized access to sensitive data.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a phishing attack?

To spread malware and viruses.

To gain unauthorized access to a system.

To deceive individuals into revealing sensitive information.

To promote fake products and services.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are some red flags to look out for in phishing emails?

Suspicious sender email addresses, generic greetings, urgent or threatening language, requests for personal information, spelling and grammatical errors, and suspicious attachments or links.

Emails from unrecognized or suspicious domains, offers that seem too good to be true, requests for password or login credentials, emails that claim to be from a government agency or financial institution

Vague or generic email content, excessive use of exclamation marks or capital letters, requests for immediate action or response, poor formatting or design

Unusual email subject lines, unfamiliar sender names, requests for money or financial information, misspelled company names or logos

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you verify the authenticity of a website to prevent phishing attacks?

Ignore any security warnings from your browser.

Click on any pop-up ads on the website to verify its authenticity.

Check for spelling errors in the website URL.

Verify HTTPS, SSL certificate, trust indicators, domain name, and be cautious of suspicious emails or links.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?