1.1.3 Email and Social Media Security Risk Quiz

1.1.3 Email and Social Media Security Risk Quiz

12th Grade

9 Qs

quiz-placeholder

Similar activities

Email Basics

Email Basics

10th Grade - Professional Development

10 Qs

Studio - U3 - LO1 - 1.3 Importance of Cyber Security

Studio - U3 - LO1 - 1.3 Importance of Cyber Security

9th Grade - University

10 Qs

Unit 3 - 4.5.1 Endpoint Protocol and Email Security

Unit 3 - 4.5.1 Endpoint Protocol and Email Security

9th Grade - University

9 Qs

Email Software Skills

Email Software Skills

KG - Professional Development

10 Qs

Slave To Technology

Slave To Technology

1st - 12th Grade

12 Qs

Technical Terms - Internet (A-Z) - Attachment

Technical Terms - Internet (A-Z) - Attachment

12th Grade

10 Qs

Outlook Module 1 Vocab

Outlook Module 1 Vocab

10th - 12th Grade

11 Qs

Lesson 4 - Using Email Quiz

Lesson 4 - Using Email Quiz

6th Grade - University

14 Qs

1.1.3 Email and Social Media Security Risk Quiz

1.1.3 Email and Social Media Security Risk Quiz

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Wakisha Turrentine

Used 1+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Grace, Aria, and Henry are discussing the use of email. Henry believes there are some privacy concerns associated with email usage. What could be some of these concerns?

Email usage has no impact on privacy

No concerns at all, email is completely secure

Privacy concerns only exist for physical mail, not email

Unauthorized access, interception of sensitive information, and potential data breaches

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Harper, Charlotte, and Evelyn are discussing how to enhance the security settings for their social media accounts. What advice should they follow?

They should use the same password for all their social media accounts

They should click on suspicious links and emails

They should enable two-factor authentication, use strong and unique passwords, be cautious of third-party apps, and regularly review privacy settings.

They should share their passwords with friends and family

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Aiden received an email from an unknown sender asking for urgent help. Olivia noticed some unusual requests in the email. Rohan suggested checking the sender's email address for any slight variations or misspellings. What are some common impersonation scams in emails and how can they be identified in this scenario?

Trusting any urgent or unusual requests without verifying them

Checking the sender's email address for any slight variations or misspellings, verifying the request through another communication channel, and being cautious of urgent or unusual requests.

Ignoring the sender's email address and responding to the request immediately

Clicking on any links or attachments without checking for suspicious content

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Arjun received an email asking for his personal information for a job offer. Benjamin warned him about the potential risks of sharing personal information through email. What could these risks be?

Arjun getting a job offer

Benjamin receiving a large inheritance

Potential risks include identity theft, phishing attacks, and unauthorized access to sensitive data.

Kai winning a free vacation

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Michael is trying to secure his social media account and comes across the concept of two-factor authentication. Explain this concept in the context of Michael's social media security.

Two-factor authentication requires Michael to share his password with his friend Maya for extra security.

Two-factor authentication adds an extra layer of security to Michael's account by requiring a second form of verification, such as a code sent to his mobile device, in addition to the usual username and password.

Two-factor authentication means Michael using the same password for multiple social media accounts.

Two-factor authentication involves Michael answering a security question instead of entering a code.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Abigail received an email claiming to be from her bank, asking for her account details. Evelyn got a similar email from her social media platform asking for her password. Luna also received an email from an unknown sender with a suspicious attachment. How can they protect themselves from falling victim to these potential phishing emails?

By providing their personal information in response to the email

By ignoring the sender's identity and responding to the email

By being cautious of unsolicited emails, not clicking on suspicious links or attachments, and verifying the sender's identity.

By opening all attachments and links in the email

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Aiden received an email from an unknown sender asking for his personal information urgently and the email had poor grammar and spelling. Samuel received an email from a known sender with friendly language and tone. Aria received an email with proper grammar and spelling. Based on these scenarios, who might have received an impersonation scam email?

Aiden

Samuel

Aria

None of them

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Abigail received an email claiming to be from her bank, asking for her account details. How can she verify the authenticity of this email to avoid falling for impersonation scams?

By checking the sender's email address, looking for spelling and grammar errors, and avoiding clicking on suspicious links or attachments.

By forwarding the email to everyone in her contact list, including Elijah and Harper

By clicking on all links and attachments in the email

By responding to the email with her personal information

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Aria, Sophia, and Henry are discussing how to secure their social media accounts from unauthorized access. What advice should they follow?

Never updating privacy settings

Using the same password for all accounts

Sharing personal information openly

Using strong and unique passwords, enabling two-factor authentication, being cautious about the information they share, and regularly updating privacy settings.