What is a characteristic of phishing?
2.8 Social Engineering 5

Quiz
•
Computers
•
12th Grade
•
Hard
Amy Austin
Used 8+ times
FREE Resource
23 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It is easily identifiable as fraudulent.
It appears trustworthy.
It is only sent to a few selected individuals.
It is always blocked by email filters.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How do phishing attackers typically distribute their messages?
By sending personalized emails to each individual.
By posting on social media.
By sending mass emails.
By making phone calls.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes the appearance of phishing emails?
They look suspicious and are easy to spot.
They contain a lot of spelling and grammar mistakes.
They look legitimate.
They are usually filtered into the spam folder.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of the email shown in the image?
To inform Tim Landon about a legitimate transaction
To request personal contact information under the guise of returning money
To confirm a scheduled meeting with Tim Landon
To provide customer service support for a PayPal transaction
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the two key actions involved in Spear Phishing according to the learning material?
Send random emails, Use malware
Gather information, Send specific email
Hack into servers, Steal passwords
Create fake websites, Trick users
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is SMiShing commonly characterized by?
A) A legitimate text message asking for personal information
B) A text message with an urgent topic requiring immediate action and containing a malware link
C) A phone call from a trusted organization
D) An email with a secure attachment
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a method used in pharming to redirect a user's traffic?
Installing antivirus software
DNS cache poisoning
Updating browser
Using a firewall
Create a free account and access millions of resources
Similar Resources on Quizizz
20 questions
Cybersecurity2

Quiz
•
12th Grade
22 questions
Studio - U3 - LO2-2.4 Targets for Cyber Security threats

Quiz
•
12th Grade
24 questions
Chapter 11: Security and Privacy

Quiz
•
10th Grade - University
20 questions
Cybersecurity Threats and Prevention Quiz

Quiz
•
9th Grade - University
20 questions
025_Other Social Engineering Attacks–CompTIA Security+ SY0-701

Quiz
•
9th - 12th Grade
20 questions
Cyber Security

Quiz
•
8th - 12th Grade
21 questions
Hackers & Cyber Attacks

Quiz
•
12th Grade
20 questions
036_Supply Chain Vulnerabilities – CompTIA Security+

Quiz
•
9th - 12th Grade
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade
Discover more resources for Computers
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
17 questions
Parts of Speech

Quiz
•
7th - 12th Grade
20 questions
Chapter 3 - Making a Good Impression

Quiz
•
9th - 12th Grade
20 questions
Inequalities Graphing

Quiz
•
9th - 12th Grade
10 questions
Identifying equations

Quiz
•
KG - University