
Phishing Awareness Quiz
Authored by Tobias Mense
Information Technology (IT)
Professional Development
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
11 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
These attacks involve the compromise of legitimate business email accounts to conduct unauthorized transfers of funds.
Email Phishing
BEC
URL
Smishing
Answer explanation
The correct answer is BEC (Business Email Compromise), which specifically refers to attacks that exploit legitimate business email accounts to carry out unauthorized fund transfers.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How do you spot a spear phish?
Unexpected requests from known contacts.
Personalized messages that seem out of character.
Emails that request sensitive information or immediate action.
Look for inconsistencies in the sender's email address and domain
All of the above.
Answer explanation
To spot a spear phish, look for unexpected requests from known contacts, personalized messages that seem unusual, emails asking for sensitive info or urgent action, and inconsistencies in the sender's email. All these signs indicate a potential spear phishing attempt.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In what type of phishing attack do attackers create fake profiles or hijack legitimate ones to deceive users into revealing personal information or downloading malware?
Angler Phishing
Whaling
Vising
Email Phishing
Answer explanation
Angler Phishing involves attackers creating fake profiles or hijacking legitimate ones on social media to trick users into sharing personal information or downloading malware, making it the correct choice.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Smishing uses _________ to deceive people.
Emails
Fake websites
Text messages
Short videos
Answer explanation
Smishing specifically uses text messages to trick individuals into revealing personal information or downloading malicious content, making 'Text messages' the correct answer.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one is NOT a common characteristic of phishing?
Urgent or threatening tone
Offers that seem too good to be true
Unusual or generic greetings
Emails from a known source
Answer explanation
Phishing typically involves emails that appear to be from unknown or suspicious sources. Emails from a known source are not characteristic of phishing, as they usually aim to deceive by impersonating legitimate entities.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What scenario could happen if you open a phishing link?
Nothing
A website opens asking for additional personal information.
You get an error message
Chrome will close.
Answer explanation
Opening a phishing link often leads to a fraudulent website that requests personal information, making 'A website opens asking for additional personal information' the correct scenario. Other options are less likely.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are common characteristics of a phishing attack?
The sender email address does not match the expected sender name.
The email is an email that you expected.
The email includes a disclaimer this email is a scam.
The email does not contain a link.
Answer explanation
A common characteristic of phishing attacks is that the sender's email address often does not match the expected sender name, indicating a potential scam. The other options do not accurately describe typical phishing traits.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
11 questions
activity ,intro to blockchaine
Quiz
•
Professional Development
15 questions
SQL com Supabase
Quiz
•
Professional Development
10 questions
Agile Thoughts Trivia - TG
Quiz
•
Professional Development
10 questions
Canva
Quiz
•
Professional Development
15 questions
Informática Forense
Quiz
•
Professional Development
10 questions
Criação de tabelas e maniulação de dados nas tabelas com SQL
Quiz
•
Professional Development
10 questions
AI in Lesson Planning Quiz- LIA
Quiz
•
Professional Development
10 questions
1. Introducción a Canva y su configuración inicial
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Information Technology (IT)
15 questions
LOTE_SPN2 5WEEK3 Day 2 Itinerary
Quiz
•
Professional Development
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
42 questions
LOTE_SPN2 5WEEK2 Day 4 We They Actividad 3
Quiz
•
Professional Development
6 questions
Copy of G5_U6_L3_22-23
Lesson
•
KG - Professional Dev...
20 questions
Employability Skills
Quiz
•
Professional Development