Cybersecurity - Malware and Phishing

Cybersecurity - Malware and Phishing

9th - 12th Grade

30 Qs

quiz-placeholder

Similar activities

Living Online Review Part 2

Living Online Review Part 2

6th - 12th Grade

25 Qs

Effects and Security of ICT

Effects and Security of ICT

9th - 10th Grade

25 Qs

e safety and security

e safety and security

10th Grade

25 Qs

Secuity threats

Secuity threats

11th Grade

25 Qs

Phishing and Social Engineering Awareness

Phishing and Social Engineering Awareness

7th Grade - University

28 Qs

BTEC Tech Award DIT - Threats, Prevention, Policy (Complete)

BTEC Tech Award DIT - Threats, Prevention, Policy (Complete)

9th - 10th Grade

26 Qs

J277 Networks

J277 Networks

12th Grade

34 Qs

Living Online Review Part 1

Living Online Review Part 1

6th - 12th Grade

25 Qs

Cybersecurity - Malware and Phishing

Cybersecurity - Malware and Phishing

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Ramon Torres

Used 6+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is a common technique used by scammers in phishing attacks?

Sending emails with perfect grammar and spelling.

Using fake websites that look like legitimate ones.

Offering free services without any conditions.

Providing detailed contact information for verification.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a red flag that an online offer might be a scam?

The offer is available for a limited time only.

The offer requires payment through a secure website.

The offer promises high returns with little risk.

The offer is from a well-known company.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

How can enabling F2A (Two-Factor Authentication) help protect your online accounts?

It makes your password more complex.

It requires a second form of verification, making it harder for unauthorized access.

It automatically changes your password every month.

It allows you to log in from multiple devices simultaneously.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following actions should you take if you suspect an email is a phishing attempt?

Click on the link to verify its authenticity.

Reply to the email asking for more information.

Delete the email and report it to your email provider.

Forward the email to your friends for their opinion.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Identity theft is a crime in which your private information is stolen and used for ________ activity.

Hidden

Criminal

Advertising

News

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You see a contest that reads, "Win $10,000 instantly! Click this link to sign up!" You click on the link, and the website asks for your name, address, and email to enter the contest. Why could it be unsafe to share your private information?

You could no longer be you.

Someone could steal your information to create a fake identity pretending to be you.

Someone could give you a lot of money.

Your information would be safe because you're sharing the information online.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

Is this a legitimate email or an example of phishing?

Legitimate email

Phishing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?