Cybersecurity - Malware and Phishing

Cybersecurity - Malware and Phishing

9th - 12th Grade

30 Qs

quiz-placeholder

Similar activities

1.3.2.2 Cyber Security - Social Engineering

1.3.2.2 Cyber Security - Social Engineering

10th Grade

25 Qs

TAHS Y9 T5 review

TAHS Y9 T5 review

9th Grade

29 Qs

Chapter 5 - Online Protection

Chapter 5 - Online Protection

9th - 12th Grade

34 Qs

Cyber security

Cyber security

11th Grade

26 Qs

e safety and security

e safety and security

10th Grade

25 Qs

BTEC Tech Award DIT - Threats, Prevention, Policy (Complete)

BTEC Tech Award DIT - Threats, Prevention, Policy (Complete)

9th - 10th Grade

26 Qs

J277 Networks

J277 Networks

12th Grade

34 Qs

UTS TIK Kelas 9

UTS TIK Kelas 9

9th Grade - University

25 Qs

Cybersecurity - Malware and Phishing

Cybersecurity - Malware and Phishing

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Ramon Torres

Used 6+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is a common technique used by scammers in phishing attacks?

Sending emails with perfect grammar and spelling.

Using fake websites that look like legitimate ones.

Offering free services without any conditions.

Providing detailed contact information for verification.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a red flag that an online offer might be a scam?

The offer is available for a limited time only.

The offer requires payment through a secure website.

The offer promises high returns with little risk.

The offer is from a well-known company.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

How can enabling F2A (Two-Factor Authentication) help protect your online accounts?

It makes your password more complex.

It requires a second form of verification, making it harder for unauthorized access.

It automatically changes your password every month.

It allows you to log in from multiple devices simultaneously.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following actions should you take if you suspect an email is a phishing attempt?

Click on the link to verify its authenticity.

Reply to the email asking for more information.

Delete the email and report it to your email provider.

Forward the email to your friends for their opinion.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Identity theft is a crime in which your private information is stolen and used for ________ activity.

Hidden

Criminal

Advertising

News

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You see a contest that reads, "Win $10,000 instantly! Click this link to sign up!" You click on the link, and the website asks for your name, address, and email to enter the contest. Why could it be unsafe to share your private information?

You could no longer be you.

Someone could steal your information to create a fake identity pretending to be you.

Someone could give you a lot of money.

Your information would be safe because you're sharing the information online.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

Is this a legitimate email or an example of phishing?

Legitimate email

Phishing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?