Which of the following best describes phishing?
Unit 2 - 2.2.3 Phishing and Spam

Quiz
•
Computers
•
9th Grade
•
Medium
PHILLIP VEET
Used 8+ times
FREE Resource
8 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Fishing for compliments on social media
Attempting to gain sensitive information through electronic communication by posing as a trustworthy source
Using real fishing as a metaphor for online security
Sending out random emails without a specific target
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common characteristic of obvious phishing attempts?
Proper grammar and spelling
Well-designed graphics and fonts
Misspelled words and odd graphics
Promises that seem too good to be true
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is another term for phishing done by phone call or voice message?
Voice Broadcasting
Voice Messaging
Voice Phishing or Vishing
Telephonic Phishing
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary goal of eliciting information in phishing attacks?
To entertain the victim
To gather personal information from the victim
To educate the victim about online security
To provide assistance to the victim
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is spear phishing?
Phishing attempt directed at a specific target using personal information
Phishing attempt directed at a large number of random individuals
Phishing attempt using cloned email addresses
Phishing attempt conducted through text messages
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which term refers to spam sent over instant messaging apps?
Email Spam
Text Messaging Spam
Spam over Internet Messaging
Voice Messaging Spam
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is whaling in the context of phishing?
Phishing attempt directed at high-profile targets like CEOs
Phishing attempt directed at low-profile individuals
Phishing attempt using cloned email addresses
Phishing attempt through voice messages
8.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is clone phishing?
Creating a duplicate email with malicious content
Cloning the victim's email address
Cloning the victim's personal information
Cloning the victim's social media account
Similar Resources on Quizizz
7 questions
1.1.3 Cybersecurity Email and Social Media

Quiz
•
9th - 12th Grade
12 questions
Identity Theft

Quiz
•
8th - 12th Grade
10 questions
Technical Terms - Internet (A-Z) - Phishing

Quiz
•
12th Grade
10 questions
Cyber Security

Quiz
•
University
10 questions
Phishing Quiz

Quiz
•
10th Grade
10 questions
AQA GCSE Computer Science - 3.6.1.1 Pharming & Shouldering

Quiz
•
8th - 10th Grade
10 questions
BTEC UNIT 1 THE ONLINE WORLD QUIZ 2

Quiz
•
12th Grade
10 questions
WJEC GCSE Digital Technology - 1.1.3.1 - Digital Communication

Quiz
•
9th Grade
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade
Discover more resources for Computers
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
17 questions
Parts of Speech

Quiz
•
7th - 12th Grade
20 questions
Chapter 3 - Making a Good Impression

Quiz
•
9th - 12th Grade
20 questions
Inequalities Graphing

Quiz
•
9th - 12th Grade
10 questions
Identifying equations

Quiz
•
KG - University