Types of Attacks - Phishing

Types of Attacks - Phishing

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

EmTech Q1 Post Test 1

EmTech Q1 Post Test 1

11th Grade

10 Qs

E-safety

E-safety

6th Grade - Professional Development

15 Qs

Total Defence Quiz

Total Defence Quiz

10th Grade

15 Qs

02 Social Engineering

02 Social Engineering

10th Grade

15 Qs

Keamanan Digital dan Etika Bermedia Sosial

Keamanan Digital dan Etika Bermedia Sosial

11th Grade - University

15 Qs

Conficker

Conficker

KG - Professional Development

15 Qs

Moonwolves vs Sunhyenas

Moonwolves vs Sunhyenas

KG - Professional Development

10 Qs

Internet Threats

Internet Threats

12th Grade

10 Qs

Types of Attacks - Phishing

Types of Attacks - Phishing

Assessment

Quiz

Other

9th - 12th Grade

Medium

Created by

Esther Brown

Used 11+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a phishing attack?

A phishing attack is a type of social engineering attack where an attacker manipulates individuals to gain access to their sensitive information.

A phishing attack is a type of physical attack where an attacker physically assaults individuals to steal their personal information.

A phishing attack is a type of cyber attack where an attacker poses as a trustworthy entity to deceive individuals into revealing sensitive information.

A phishing attack is a type of software attack where an attacker infects a computer with a virus to steal personal information.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are some common signs of a phishing email?

Emails from known contacts, urgent or threatening language, requests for personal information or login credentials

Generic greetings, suspicious links or attachments, misspelled words or poor grammar

Requests for personal information or login credentials, misspelled words or poor grammar, emails from known contacts

misspelled words or poor grammar, generic greetings, requests for personal information or login credentials, suspicious links or attachments, urgent or threatening language

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you protect yourself from phishing attacks?

Be cautious of suspicious emails or messages, avoid clicking on unknown links or downloading attachments from unfamiliar sources, verify the legitimacy of websites before entering personal information, regularly update your software and antivirus programs, and educate yourself about common phishing techniques.

Ignore software and antivirus updates

Download attachments from unfamiliar sources without hesitation

Always click on links in emails to verify their legitimacy

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is spear phishing?

Spear phishing is a targeted form of phishing.

Spear phishing is a form of fishing that uses a spear instead of a fishing rod.

Spear phishing is a type of phishing that targets only large corporations.

Spear phishing is a type of fishing sport using a spear.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a phishing attack?

To deceive individuals and obtain sensitive information.

To enhance data encryption and protection.

To promote online safety and awareness.

To provide cybersecurity training to individuals.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are some examples of phishing attacks?

email phishing, spear phishing, smishing, vishing, and pharming

malware, ransomware, trojan

pharming, whaling, spoofing

keylogging, social engineering, brute force

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the difference between phishing and pharming?

Phishing is a type of malware, while pharming is a type of social engineering.

Phishing involves stealing personal information, while pharming involves spreading viruses.

Phishing is a physical attack, while pharming is a digital attack.

Phishing is impersonating a legitimate entity to trick individuals, while pharming is redirecting website traffic to a fake website.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?