Search Header Logo

Phishing

Authored by Ritu Sharma

Computers

University

Used 9+ times

Phishing
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does spear phishing differ from regular phishing?

It targets a large number of random individuals

It is a highly targeted attack aimed at specific individuals or organizations

It involves voice-based scams instead of emails

It only occurs on social media platforms

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these best describes a spear phishing attack?

A fake antivirus alert that tricks users into downloading malware

An email tailored to a specific person using personal details to appear legitimate

A fraudulent lottery email sent to thousands of people

A random phone call pretending to be from your bank

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of phishing attacks?

To improve online security

To gain unauthorized access to personal or financial information

To promote cybersecurity awareness

 To block spam emails

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you best protect yourself from phishing attacks?

Click on all links to verify their authenticity

Ignore emails from unknown senders

Respond quickly to emails that request urgent action

Verify sender details and avoid clicking on suspicious links

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is whaling?

A phishing attack targeting high-profile individuals like executives or government officials

A scam that uses fake customer service representatives

A technique used to steal credit card information through skimmers

A type of malware that encrypts files for ransom

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is "mishing," according to Zimperium?

A new type of email-based phishing attack

A form of phishing that targets mobile devices using various techniques

A method of stealing passwords through malware

A phishing attack that only uses QR codes

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT included in the term "mishing" as defined by Zimperium?

Smishing (SMS-based phishing)

Quishing (QR code phishing)

Evil Twin attack (Wi-Fi phishing)

Deepfake video scams

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers