Search Header Logo

Unit 2 - 2.2.3 Phishing and Spam

Authored by PHILLIP VEET

Computers

9th Grade

Used 35+ times

Unit 2 - 2.2.3 Phishing and Spam
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes phishing?

Fishing for compliments on social media

Attempting to gain sensitive information through electronic communication by posing as a trustworthy source

Using real fishing as a metaphor for online security

Sending out random emails without a specific target

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common characteristic of obvious phishing attempts?

Proper grammar and spelling

Well-designed graphics and fonts

Misspelled words and odd graphics

Promises that seem too good to be true

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is another term for phishing done by phone call or voice message?

Voice Broadcasting

Voice Messaging

Voice Phishing or Vishing

Telephonic Phishing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of eliciting information in phishing attacks?

To entertain the victim

To gather personal information from the victim

To educate the victim about online security

To provide assistance to the victim

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is spear phishing?

Phishing attempt directed at a specific target using personal information

Phishing attempt directed at a large number of random individuals

Phishing attempt using cloned email addresses

Phishing attempt conducted through text messages

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term refers to spam sent over instant messaging apps?

Email Spam

Text Messaging Spam

Spam over Internet Messaging

Voice Messaging Spam

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is whaling in the context of phishing?

Phishing attempt directed at high-profile targets like CEOs

Phishing attempt directed at low-profile individuals

Phishing attempt using cloned email addresses

Phishing attempt through voice messages

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?