Understanding Phishing Attacks

Understanding Phishing Attacks

11th Grade

10 Qs

quiz-placeholder

Similar activities

Bimestral 2P

Bimestral 2P

11th Grade

15 Qs

IT Security Threats

IT Security Threats

10th - 12th Grade

11 Qs

Social Engineering Game

Social Engineering Game

9th - 12th Grade

12 Qs

Social Engineering

Social Engineering

11th Grade

12 Qs

Data Protection

Data Protection

KG - 12th Grade

10 Qs

Network Security Revision

Network Security Revision

11th Grade

10 Qs

CyberSafety Pre-Assessment

CyberSafety Pre-Assessment

KG - University

16 Qs

Phishing and spam

Phishing and spam

9th - 12th Grade

10 Qs

Understanding Phishing Attacks

Understanding Phishing Attacks

Assessment

Interactive Video

Computers

11th Grade

Hard

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the initial action that led Jane to fall victim to the phishing attack?

She updated her credit card PIN through the email link.

She ignored the email.

She contacted the bank immediately.

She deleted the email.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of a phishing attack?

To gain access to sensitive information.

To improve email security.

To provide free services.

To entertain the victim.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for phishing attacks conducted via SMS?

Smishing

Vishing

Pharming

Whaling

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of phishing involves sending a general email to many users?

Spear Phishing

Deceptive Phishing

Whaling

Pharming

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does spear phishing differ from deceptive phishing?

It is less effective.

It uses fake websites.

It involves more research on the target.

It targets a large group of people.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main focus of whaling attacks?

Sending mass emails

Targeting high-profile individuals

Targeting random individuals

Creating fake websites

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common method used in pharming attacks?

Using domain names similar to legitimate ones.

Sending emails with attachments.

Sending text messages.

Calling the victim directly.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?