
Unit 1 Year 8 Q and A
Authored by Kawkab Sobh
Computers
7th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
14 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Phishing attacks often use fake emails to trick individuals into providing sensitive information like passwords or account numbers.
True
False
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Smishing is a type of phishing that occurs through fraudulent phone calls.
True
False
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Pharming attacks can redirect users from legitimate websites to fake ones without the user's knowledge.
True
False
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Spyware can be installed secretly on your device to collect personal data such as your passwords or browsing history.
True
False
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Cookies are harmful files that install malware on your computer and steal your personal data.
True
False
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Spam emails are often unsolicited and can sometimes contain links to malware or phishing websites.
True
False
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes phishing?
a) Sending unsolicited bulk emails.
b) Installing malicious software to track users' keystrokes.
c) Sending fraudulent emails pretending to be from trusted companies to steal sensitive information.
d) Redirecting users to fake websites to steal information.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?