Search Header Logo

Protecting Yourself

Authored by Taleyah Willis

Computers

10th Grade

Used 9+ times

Protecting Yourself
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Deliberate attempt to gain from deceiving or misleading others is known as ________.

Deter

Detect

Virus

Fraud

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____ Is the attempt to acquire personal information by masquerading as a trustworthy entity.

Vishing

Smishing

Identity theft

Phishing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ is when another way a hacker or fraudster try to lure you into giving up their personal information.

Pharming

Phishing

Deter

Virus

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____ Is when a fraudster tries to manipulate you into giving out your personal information via phone.

Vishing

Defend

Identity theft

Scammers

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ Is a social attack that uses fake phone numbers or fake text messages to hack into your phone a give your a serious virus.

Smishing

Vishing

Detect

Defend

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____ Is when a person steals your identity.

Identity theft

Source credibility

Phantom Riches

Social consensus

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Minimize your risk by safe guarding your personal information

Deter

Detect

Defend

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?