Phishing Awareness Quiz

Phishing Awareness Quiz

Professional Development

11 Qs

quiz-placeholder

Similar activities

Cybersecurity Core Functions

Cybersecurity Core Functions

Professional Development

15 Qs

Phishing

Phishing

Professional Development

16 Qs

DEAM (Quiz 1)

DEAM (Quiz 1)

Professional Development

11 Qs

DT IT Security Awareness Quiz

DT IT Security Awareness Quiz

Professional Development

16 Qs

cyber Security Awareness

cyber Security Awareness

Professional Development

15 Qs

Cyber Security

Cyber Security

Professional Development

10 Qs

Kamis Kuis

Kamis Kuis

Professional Development

10 Qs

Phishing Awareness Quiz

Phishing Awareness Quiz

Assessment

Quiz

Information Technology (IT)

Professional Development

Hard

Created by

Tobias Mense

Used 2+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

These attacks involve the compromise of legitimate business email accounts to conduct unauthorized transfers of funds.

Email Phishing

BEC

URL

Smishing

Answer explanation

The correct answer is BEC (Business Email Compromise), which specifically refers to attacks that exploit legitimate business email accounts to carry out unauthorized fund transfers.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do you spot a spear phish?

Unexpected requests from known contacts.

Personalized messages that seem out of character.

Emails that request sensitive information or immediate action.

Look for inconsistencies in the sender's email address and domain

All of the above.

Answer explanation

To spot a spear phish, look for unexpected requests from known contacts, personalized messages that seem unusual, emails asking for sensitive info or urgent action, and inconsistencies in the sender's email. All these signs indicate a potential spear phishing attempt.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In what type of phishing attack do attackers create fake profiles or hijack legitimate ones to deceive users into revealing personal information or downloading malware?

Angler Phishing

Whaling

Vising

Email Phishing

Answer explanation

Angler Phishing involves attackers creating fake profiles or hijacking legitimate ones on social media to trick users into sharing personal information or downloading malware, making it the correct choice.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Smishing uses _________ to deceive people.

Emails

Fake websites

Text messages

Short videos

Answer explanation

Smishing specifically uses text messages to trick individuals into revealing personal information or downloading malicious content, making 'Text messages' the correct answer.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one is NOT a common characteristic of phishing?

Urgent or threatening tone

Offers that seem too good to be true

Unusual or generic greetings

Emails from a known source

Answer explanation

Phishing typically involves emails that appear to be from unknown or suspicious sources. Emails from a known source are not characteristic of phishing, as they usually aim to deceive by impersonating legitimate entities.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What scenario could happen if you open a phishing link?

Nothing

A website opens asking for additional personal information.

You get an error message

Chrome will close.

Answer explanation

Opening a phishing link often leads to a fraudulent website that requests personal information, making 'A website opens asking for additional personal information' the correct scenario. Other options are less likely.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are common characteristics of a phishing attack?

The sender email address does not match the expected sender name.

The email is an email that you expected.

The email includes a disclaimer this email is a scam.

The email does not contain a link.

Answer explanation

A common characteristic of phishing attacks is that the sender's email address often does not match the expected sender name, indicating a potential scam. The other options do not accurately describe typical phishing traits.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?