Phishing | Reading Comprehension Quiz

Phishing | Reading Comprehension Quiz

5th Grade

15 Qs

quiz-placeholder

Similar activities

From the Sea

From the Sea

KG - 6th Grade

12 Qs

Island of Blue Dolphins Chapter 13-17

Island of Blue Dolphins Chapter 13-17

4th - 6th Grade

15 Qs

SPM Grammar Quiz

SPM Grammar Quiz

5th - 10th Grade

10 Qs

The Jungle Book

The Jungle Book

4th - 5th Grade

10 Qs

The Hatchet 16-19

The Hatchet 16-19

5th Grade

10 Qs

Hunger Games: Ch. 16-17

Hunger Games: Ch. 16-17

5th - 12th Grade

15 Qs

Dingoes – Dangerous or Desperate?

Dingoes – Dangerous or Desperate?

5th Grade

10 Qs

Summer of Terror Quiz

Summer of Terror Quiz

5th Grade

14 Qs

Phishing | Reading Comprehension Quiz

Phishing | Reading Comprehension Quiz

Assessment

Quiz

English

5th Grade

Hard

CCSS
RI.6.6, RI.4.7, RI.3.5

+34

Standards-aligned

Created by

Alex Correa

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is a phishing attack?

Throwing water on an adversary's computer

Sneaking into a concert without paying

Tricking someone into giving away sensitive data

Buying something with someone else's credit

Tags

CCSS.RI.4.7

CCSS.RI.5.7

CCSS.RI.6.7

CCSS.RL.5.7

CCSS.RL.6.7

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the difference between a phishing and spear phishing attack?

A phishing attack is more convincing than a spear phishing attack.

A spear phishing attack involves theft or identity fraud and phishing does not.

A spear phishing attack is targeted while phishing is random.

A phishing attack is illegal while spear phishing is legal.

Tags

CCSS.RI.11-12.10

CCSS.RI.6.10

CCSS.RI.7.10

CCSS.RI.8.10

CCSS.RI.9-10.10

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is NOT a motive or reason for phishing mentioned in the text?

To commit identity fraud

To gain control of someone else's computer network

To disarm home alarm systems

To steal private communication or records

Tags

CCSS.RI.3.5

CCSS.RI.4.5

CCSS.RI.5.5

CCSS.RI.6.5

CCSS.RI.7.5

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can 2FA protect users from phishing attacks?

The attacker needs a fingerprint or eyeball scan to access the account.

Two people have to approve the login, so the attacker can't do it alone.

Users need two keys to login, and the user can't give away one of the keys.

Nobody can log into the account under any circumstances.

Tags

CCSS.RI.3.5

CCSS.RI.4.5

CCSS.RI.5.5

CCSS.RI.6.5

CCSS.RI.7.5

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement would the author most likely AGREE with?

In a phishing attack, an attacker overpowers a victim with a stronger computer.

If a phishing attack is successful, users willingly give attackers sensitive data.

Every phishing attack involves stealing the victim's identity to commit fraud.

In a spear phishing attack, the attacker erases the victim's identity.

Tags

CCSS.RI.6.6

CCSS.RI.6.9

CCSS.RL.4.6

CCSS.RL.5.6

CCSS.RL.6.6

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement would the author most likely DISAGREE with?

The domains 'google.com' and 'accounts-google.com' go to the same place.

You should check your address bar carefully before submitting your data.

Hilary Clinton's campaign team was spear phished in 2016.

Some links send users to phony sites designed to steal passwords.

Tags

CCSS.RI.6.6

CCSS.RI.6.9

CCSS.RL.4.6

CCSS.RL.5.6

CCSS.RL.6.6

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which best describes the main idea of the THIRD paragraph?

To explain how phishing attacks are executed

To teach readers how to defend against phishing attacks

To compare and contrast phishing and spear phishing

To describe the reasons for phishing attacks

Tags

CCSS.RI.5.2

CCSS.RI.6.2

CCSS.RL.4.2

CCSS.RL.5.2

CCSS.RL.6.2

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?