Search Header Logo

Phishing & Ransomware

Authored by Ezry Ibrahim

Computers

Professional Development

Phishing & Ransomware
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

A few Alcom employees report receiving an email stating that their account password will expire immediately and that they should click the embedded link to reset their password within five minutes. How would you classify this email?

Fishing

Snorkeling

Diving

Phishing

2.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

What should employees do if they suspect a phishing attempt?

Interact with the scammer directly by confronting them and getting down to the bottom of the situation.

Forward the phishing email to a friend or colleague to ask them if they can check the link out first.

Double-check the email ID and the content, then contact your supervisor or the IT department to confirm its authenticity.

Click on the link anyway and see where it takes you.

3.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

What are the most popular signs of a phishing scam?

The email comes with a disclaimer/alert notifying the user that it is spam.

The email is empty and contains nothing in the subject or body.

An authentic sender sending regular subscribed updates.

Inconsistency in the sender’s email ID and how the recipient is addressed.

4.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

What happens if you click on a phishing email link or attachment?

Browser/app is closed without any prompt.

You are redirected to a website that asks you to enter sensitive information or directs you to download an attachment.

You get an error page on the screen.

None of the above.

5.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Why do I need to watch out for phishing emails?

For personal safety and security.

To protect your identity and sensitive information.

To prevent being duped and falling for scams.

All of the above.

6.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

How can a person executing a phishing attack steal someone's identity?

They pretend they are someone else when emailing phishing messages, so that's like stealing an identity.

They ask for personal information on a webpage or pop-up window linked from the phishing email, and they use the information entered to make illegal purchases or commit fraud.

They send a request for the recipient's driver's license and credit cards.

They ask for money to purchase your ID on the black market.

7.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Unsure whether an email is real or phishing? Which of the following should you do?

An unknown email sender sound vague or generic, and is threatening something about one of your online accounts? Report it as phishing.

An alert email comes from PayPal or your bank. Open a new browser window and go to your account to see if anything is happening with your account.

An offer appears to be from Amazon, but upon closer inspection it's actually from Amzon.co. You should report and delete the email.

All of the above.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?