Cybersecurity - Malware and Phishing

Cybersecurity - Malware and Phishing

9th - 12th Grade

30 Qs

quiz-placeholder

Similar activities

Phishing and Social Engineering Awareness

Phishing and Social Engineering Awareness

7th Grade - University

28 Qs

Phishing Awareness Quiz 2

Phishing Awareness Quiz 2

6th Grade - University

25 Qs

Cyber Crime

Cyber Crime

9th Grade

25 Qs

IGCSE ICT Chapter 8 - Safety & Security

IGCSE ICT Chapter 8 - Safety & Security

9th - 10th Grade

35 Qs

Threats To Computers

Threats To Computers

10th - 11th Grade

25 Qs

Social Engineering and Malware

Social Engineering and Malware

8th - 11th Grade

25 Qs

Year 9 pre-exam review May 2024

Year 9 pre-exam review May 2024

9th - 12th Grade

25 Qs

Cybersecurity - Malware and Phishing

Cybersecurity - Malware and Phishing

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Ramon Torres

Used 6+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is a common technique used by scammers in phishing attacks?

Sending emails with perfect grammar and spelling.

Using fake websites that look like legitimate ones.

Offering free services without any conditions.

Providing detailed contact information for verification.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a red flag that an online offer might be a scam?

The offer is available for a limited time only.

The offer requires payment through a secure website.

The offer promises high returns with little risk.

The offer is from a well-known company.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

How can enabling F2A (Two-Factor Authentication) help protect your online accounts?

It makes your password more complex.

It requires a second form of verification, making it harder for unauthorized access.

It automatically changes your password every month.

It allows you to log in from multiple devices simultaneously.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following actions should you take if you suspect an email is a phishing attempt?

Click on the link to verify its authenticity.

Reply to the email asking for more information.

Delete the email and report it to your email provider.

Forward the email to your friends for their opinion.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Identity theft is a crime in which your private information is stolen and used for ________ activity.

Hidden

Criminal

Advertising

News

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You see a contest that reads, "Win $10,000 instantly! Click this link to sign up!" You click on the link, and the website asks for your name, address, and email to enter the contest. Why could it be unsafe to share your private information?

You could no longer be you.

Someone could steal your information to create a fake identity pretending to be you.

Someone could give you a lot of money.

Your information would be safe because you're sharing the information online.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

Is this a legitimate email or an example of phishing?

Legitimate email

Phishing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?