Search Header Logo

Cybersecurity - Malware and Phishing

Authored by Ramon Torres

Computers

9th - 12th Grade

Used 6+ times

Cybersecurity - Malware and Phishing
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is a common technique used by scammers in phishing attacks?

Sending emails with perfect grammar and spelling.

Using fake websites that look like legitimate ones.

Offering free services without any conditions.

Providing detailed contact information for verification.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a red flag that an online offer might be a scam?

The offer is available for a limited time only.

The offer requires payment through a secure website.

The offer promises high returns with little risk.

The offer is from a well-known company.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

How can enabling F2A (Two-Factor Authentication) help protect your online accounts?

It makes your password more complex.

It requires a second form of verification, making it harder for unauthorized access.

It automatically changes your password every month.

It allows you to log in from multiple devices simultaneously.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following actions should you take if you suspect an email is a phishing attempt?

Click on the link to verify its authenticity.

Reply to the email asking for more information.

Delete the email and report it to your email provider.

Forward the email to your friends for their opinion.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Identity theft is a crime in which your private information is stolen and used for ________ activity.

Hidden

Criminal

Advertising

News

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You see a contest that reads, "Win $10,000 instantly! Click this link to sign up!" You click on the link, and the website asks for your name, address, and email to enter the contest. Why could it be unsafe to share your private information?

You could no longer be you.

Someone could steal your information to create a fake identity pretending to be you.

Someone could give you a lot of money.

Your information would be safe because you're sharing the information online.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

Is this a legitimate email or an example of phishing?

Legitimate email

Phishing

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?