
1.1.3 Email and Social Media Security Risk Quiz
Authored by Wakisha Turrentine
Computers
12th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
9 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Grace, Aria, and Henry are discussing the use of email. Henry believes there are some privacy concerns associated with email usage. What could be some of these concerns?
Email usage has no impact on privacy
No concerns at all, email is completely secure
Privacy concerns only exist for physical mail, not email
Unauthorized access, interception of sensitive information, and potential data breaches
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Harper, Charlotte, and Evelyn are discussing how to enhance the security settings for their social media accounts. What advice should they follow?
They should use the same password for all their social media accounts
They should click on suspicious links and emails
They should enable two-factor authentication, use strong and unique passwords, be cautious of third-party apps, and regularly review privacy settings.
They should share their passwords with friends and family
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Aiden received an email from an unknown sender asking for urgent help. Olivia noticed some unusual requests in the email. Rohan suggested checking the sender's email address for any slight variations or misspellings. What are some common impersonation scams in emails and how can they be identified in this scenario?
Trusting any urgent or unusual requests without verifying them
Checking the sender's email address for any slight variations or misspellings, verifying the request through another communication channel, and being cautious of urgent or unusual requests.
Ignoring the sender's email address and responding to the request immediately
Clicking on any links or attachments without checking for suspicious content
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Arjun received an email asking for his personal information for a job offer. Benjamin warned him about the potential risks of sharing personal information through email. What could these risks be?
Arjun getting a job offer
Benjamin receiving a large inheritance
Potential risks include identity theft, phishing attacks, and unauthorized access to sensitive data.
Kai winning a free vacation
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Michael is trying to secure his social media account and comes across the concept of two-factor authentication. Explain this concept in the context of Michael's social media security.
Two-factor authentication requires Michael to share his password with his friend Maya for extra security.
Two-factor authentication adds an extra layer of security to Michael's account by requiring a second form of verification, such as a code sent to his mobile device, in addition to the usual username and password.
Two-factor authentication means Michael using the same password for multiple social media accounts.
Two-factor authentication involves Michael answering a security question instead of entering a code.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Abigail received an email claiming to be from her bank, asking for her account details. Evelyn got a similar email from her social media platform asking for her password. Luna also received an email from an unknown sender with a suspicious attachment. How can they protect themselves from falling victim to these potential phishing emails?
By providing their personal information in response to the email
By ignoring the sender's identity and responding to the email
By being cautious of unsolicited emails, not clicking on suspicious links or attachments, and verifying the sender's identity.
By opening all attachments and links in the email
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Aiden received an email from an unknown sender asking for his personal information urgently and the email had poor grammar and spelling. Samuel received an email from a known sender with friendly language and tone. Aria received an email with proper grammar and spelling. Based on these scenarios, who might have received an impersonation scam email?
Aiden
Samuel
Aria
None of them
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?