Online Safety Rules

Online Safety Rules

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

Personal Entrepreneurial Competencies (Achievement Cluster)

Personal Entrepreneurial Competencies (Achievement Cluster)

7th - 12th Grade

10 Qs

Costumer Service Quiz

Costumer Service Quiz

12th Grade

10 Qs

Continuous Improvement and Innovation

Continuous Improvement and Innovation

12th Grade

10 Qs

Manufacturing Costs Quiz

Manufacturing Costs Quiz

10th Grade - University

15 Qs

25.2 Business Self check

25.2 Business Self check

9th - 12th Grade

10 Qs

Quiz La Publicidad

Quiz La Publicidad

12th Grade

12 Qs

HRM - Q2

HRM - Q2

1st - 10th Grade

10 Qs

PESTLE + C version 2

PESTLE + C version 2

12th Grade

15 Qs

Online Safety Rules

Online Safety Rules

Assessment

Quiz

Business

9th - 12th Grade

Hard

Created by

Sarah Benes

Used 37+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Does this look like a legitimate email address: JMayer@weIIsfarg0.com?

Yes

No

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

 You receive an internal e-mail from a coworker one day. The name isn’t familiar, but the e-mail address looks right and comes from @yourcompany.com. They’re from HR and just need to verify some information for your 401k, and they have attached an excel document with the info. What should you do?

 Check and see if the document looks real, viruses can't hide in excel worksheets anyways
 Throw away your computer and give the remains to IT
 Reply to the e-mail asking what a 401k is
Attempt to locate the HR employee and ask them in person about the document

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

 How can you verify the legitimacy of a link?

 Just look at the words in the e-mail; they never lie
 Right-click and select 'Open in a new window'
 Hover over the link and look at the bottom of your browser window
Click on it and see

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

 What’s a common way hackers disguise themselves as professional companies?

By buying a similar looking URL
By hacking the company's email
By buying off the police
By buying the company

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False: An attacker can gain access to your computer through an e-mail.

true
false

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You know that Savannah Technical College uses Blackboard. Choose the url that is least likely to be valid

https://auth.savannahtech.edu/cas/login?service

https://auth.savannahtech.webs.com/cas/login?service

http://savannahtech.blackboard.com

https://savannahtech.blackboard.com/webapps/portal

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You receive an urgent email that appears to be from IT asking you to reply with your password because your account is "compromised" or "over quota" or "suspended due to inactivity". Do you

Reply with your password
Ignore the email
Call IT to verify
Immediately log out of your email

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?