Search Header Logo

Understanding Data Theft

Authored by Dina Sharawy

Other

Professional Development

Used 1+ times

Understanding Data Theft
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Scenario 1:
A person receives an email that claims to be from their bank, asking them to update their account details urgently by clicking a link.

What is the goal of the attacker in this scenario?

To provide technical support

To update their account details

To steal the person's banking information

To verify their email address

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Scenario 1:
A person receives an email that claims to be from their bank, asking them to update their account details urgently by clicking a link.

What data is being targeted by the attacker?

Personal identification number (PIN)

Personal and financial information

Shopping preferences

Recent purchases

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Scenario 1:
A person receives an email that claims to be from their bank, asking them to update their account details urgently by clicking a link.

What technique is the attacker using?

Spoofing

Malware injection

Phishing

Social media manipulation

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Scenario 1:
A person receives an email that claims to be from their bank, asking them to update their account details urgently by clicking a link.

How can the person identify that the email is suspicious?

It contains a personalized greeting

It asks for urgent action and contains errors

It shows a familiar bank logo

It offers a discount code

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Scenario 1:
A person receives an email that claims to be from their bank, asking them to update their account details urgently by clicking a link.

What steps should the person take to protect themselves?

Click the link to see if it works

Respond to the email

Contact the bank directly and report the email

Ignore the email completely

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is a common method used by attackers to steal data?

Phishing

Physical theft

Marketing campaigns

Newsletters

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following best describes phishing?

Using malware to encrypt files

Sending fraudulent messages to trick individuals into revealing personal information

Physically breaking into a facility

Posting misleading content on social media

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?