What are some common phishing techniques?

Phishing Attacks

Quiz
•
Other
•
12th Grade
•
Hard
Kevin Clarke
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Email phishing, spear phishing, pharming, vishing, and smishing.
Social engineering, Trojan horse, Man-in-the-middle attack
Malvertising, Ransomware, Keylogging
Phlashing, Whaling, Spoofing
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can you identify phishing emails?
By providing personal or financial information requested in the email
By checking for suspicious email addresses, misspellings or grammatical errors in the email content, requests for personal or financial information, and unexpected attachments or links.
By clicking on all links and attachments in the email
By ignoring any suspicious email addresses or content
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are some preventive measures to avoid phishing attacks?
Ignoring suspicious emails or messages, clicking on unknown links or downloading attachments from unknown sources, using weak passwords, not enabling two-factor authentication, not keeping software and antivirus programs up to date, and not educating oneself about phishing techniques and how to identify them.
Being cautious of suspicious emails or messages, not clicking on unknown links or downloading attachments from unknown sources, regularly updating and using strong passwords, enabling two-factor authentication, keeping software and antivirus programs up to date, and educating oneself about phishing techniques and how to identify them.
Clicking on any link or downloading any attachment without verifying the source, using the same password for multiple accounts, not updating software and antivirus programs, and not being aware of common phishing tactics.
Trusting all emails and messages received, clicking on any link or downloading any attachment without hesitation, using simple and easily guessable passwords, not enabling any additional security measures, and not staying informed about the latest phishing scams.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is it important to protect personal information online?
To increase online security, To maintain privacy, To avoid online scams
To prevent identity theft, fraud, and unauthorized access to sensitive data.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of a phishing attack?
To spread malware and viruses.
To gain unauthorized access to a system.
To deceive individuals into revealing sensitive information.
To promote fake products and services.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are some red flags to look out for in phishing emails?
Suspicious sender email addresses, generic greetings, urgent or threatening language, requests for personal information, spelling and grammatical errors, and suspicious attachments or links.
Emails from unrecognized or suspicious domains, offers that seem too good to be true, requests for password or login credentials, emails that claim to be from a government agency or financial institution
Vague or generic email content, excessive use of exclamation marks or capital letters, requests for immediate action or response, poor formatting or design
Unusual email subject lines, unfamiliar sender names, requests for money or financial information, misspelled company names or logos
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can you verify the authenticity of a website to prevent phishing attacks?
Ignore any security warnings from your browser.
Click on any pop-up ads on the website to verify its authenticity.
Check for spelling errors in the website URL.
Verify HTTPS, SSL certificate, trust indicators, domain name, and be cautious of suspicious emails or links.
Create a free account and access millions of resources
Similar Resources on Quizizz
10 questions
Google Classroom Basics

Quiz
•
KG - 12th Grade
10 questions
Cybersecurity Threats and Prevention Quiz

Quiz
•
12th Grade
8 questions
Cybercrime

Quiz
•
KG - 12th Grade
15 questions
Cybersecurity Basics Quiz

Quiz
•
6th Grade - University
15 questions
Identity Theft

Quiz
•
10th - 12th Grade
6 questions
Phishing Simulation Campaign Quiz

Quiz
•
12th Grade
12 questions
ITGS 3.05: Hacking

Quiz
•
9th - 12th Grade
15 questions
Email Etiquette

Quiz
•
10th - 12th Grade
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
25 questions
SS Combined Advisory Quiz

Quiz
•
6th - 8th Grade
40 questions
Week 4 Student In Class Practice Set

Quiz
•
9th - 12th Grade
40 questions
SOL: ILE DNA Tech, Gen, Evol 2025

Quiz
•
9th - 12th Grade
20 questions
NC Universities (R2H)

Quiz
•
9th - 12th Grade
15 questions
June Review Quiz

Quiz
•
Professional Development
20 questions
Congruent and Similar Triangles

Quiz
•
8th Grade
25 questions
Triangle Inequalities

Quiz
•
10th - 12th Grade
Discover more resources for Other
40 questions
Week 4 Student In Class Practice Set

Quiz
•
9th - 12th Grade
40 questions
SOL: ILE DNA Tech, Gen, Evol 2025

Quiz
•
9th - 12th Grade
20 questions
NC Universities (R2H)

Quiz
•
9th - 12th Grade
25 questions
Triangle Inequalities

Quiz
•
10th - 12th Grade
65 questions
MegaQuiz v2 2025

Quiz
•
9th - 12th Grade
10 questions
GPA Lesson

Lesson
•
9th - 12th Grade
15 questions
SMART Goals

Quiz
•
8th - 12th Grade
45 questions
Week 3.5 Review: Set 1

Quiz
•
9th - 12th Grade