EPF 6.2

EPF 6.2

12th Grade

11 Qs

quiz-placeholder

Similar activities

objectives of five year plan

objectives of five year plan

9th - 12th Grade

10 Qs

IPS9 Your gamez !

IPS9 Your gamez !

12th Grade

15 Qs

KEGIATAN BELAJAR 1 : Apllication Letter

KEGIATAN BELAJAR 1 : Apllication Letter

12th Grade

11 Qs

The New Deal

The New Deal

9th - 12th Grade

11 Qs

Agriculture, NCERT X #36

Agriculture, NCERT X #36

9th - 12th Grade

13 Qs

VCE Business Management Unit 2 AOS 1

VCE Business Management Unit 2 AOS 1

10th - 12th Grade

12 Qs

Historical Thinking Vocab

Historical Thinking Vocab

9th - 12th Grade

11 Qs

EPF 6.2

EPF 6.2

Assessment

Quiz

Social Studies

12th Grade

Easy

Created by

Nikki Brewer

Used 23+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one or more of the following should you consider when creating a password to make it hard to identify with a brute force attack?

Using a common word or phrase
Using only lowercase letters and numbers
Using a password less than 8 characters long
Combination of uppercase and lowercase letters, numbers and special characters, avoiding common words or phrases, and at least 8 characters long

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Dumpster diving, skimming, and phishing are ways in which your identity may be stolen.

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

1 in 10 identity thefts go unnoticed for over two years.

True

False

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

Can you get an email scam from someone even if you never gave your email to that person?

No, you can only receive a scam from someone you know

Yes, Phishing scammers harvest email addresses

No, only if you give out your email to family and friends

No, but I am not sure why

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Match the way fraud may occur in the scenario: A scammer is using email to pretend to be your bank.

Computer

Skimming

Phishing

Stealing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Match the way fraud may occur in the scenario: A scammer has attached a device to a gas pump to access credit card information.

Computer

Skimming

Stealing

Diverting mail

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fraudulent investment operations that involve paying abnormally high returns to investors out of the money paid by other investors

Pyramid Scheme

Ponzi Scheme

Affinity Fraud

Bank Fraud

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?