PHISH: Recognizing Phishing Attempts

Interactive Video
•
Information Technology (IT), Architecture
•
KG - University
•
Hard
Wayground Content
FREE Resource
Read more
5 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is one of the first steps to recognize a phishing attempt?
Look for attachments
Verify the sender's address
Check the email's subject line
Read the email's footer
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is it important to look for spelling and grammar mistakes in emails?
They are often present in phishing attempts
They show the email is urgent
They suggest the email is from a friend
They indicate a casual tone
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What tactic do phishing emails often use to manipulate recipients?
Offer discounts
Create a sense of urgency or fear
Provide detailed company history
Include humorous content
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of information do phishing attempts often request?
Personal information
Public information
Weather updates
Company policies
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common characteristic of legitimate companies regarding personal information?
They never ask for it
They frequently ask for it via email
They ask for it only in person
They ask for it through social media
Similar Resources on Wayground
6 questions
How to Avoid Phishing Attacks

Interactive video
•
University
2 questions
The Beginners 2022 Cyber Security Awareness Training Course - What Else Can You Do to Protect Yourself Part I

Interactive video
•
University
5 questions
Practical Cyber Hacking Skills for Beginners - Crafting our Phishing Email

Interactive video
•
University
2 questions
PHISH: Preventing Phishing Attempts

Interactive video
•
KG - University
3 questions
PHISH: Introduction and explanation of Phishing

Interactive video
•
KG - University
2 questions
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Personal Cybersecurity - What I Do

Interactive video
•
University
2 questions
What is a Phishing Attack

Interactive video
•
University
2 questions
North Korean hackers stole sensitive information from Microsoft users

Interactive video
•
11th Grade - University
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
Appointment Passes Review

Quiz
•
6th - 8th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
Grammar Review

Quiz
•
6th - 9th Grade
Discover more resources for Information Technology (IT)
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Appointment Passes Review

Quiz
•
6th - 8th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
20 questions
Grammar Review

Quiz
•
6th - 9th Grade
20 questions
Lab Safety and Lab Equipment

Quiz
•
9th - 12th Grade