Phishing Attacks

Phishing Attacks

12th Grade

10 Qs

quiz-placeholder

Similar activities

Cyber Security Fundamentals

Cyber Security Fundamentals

12th Grade

10 Qs

Yr11 ICT vocab review

Yr11 ICT vocab review

11th - 12th Grade

10 Qs

Identity Theft

Identity Theft

8th - 12th Grade

12 Qs

PCC Technology and Workplace Skills

PCC Technology and Workplace Skills

9th - 12th Grade

10 Qs

Phishing Activity

Phishing Activity

6th - 12th Grade

14 Qs

Malware And Hackers

Malware And Hackers

KG - University

14 Qs

Cyber Camp Day 2 Phishing

Cyber Camp Day 2 Phishing

7th - 12th Grade

7 Qs

Intro week

Intro week

9th - 12th Grade

11 Qs

Phishing Attacks

Phishing Attacks

Assessment

Quiz

Other

12th Grade

Hard

Created by

Kevin Clarke

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are some common phishing techniques?

Email phishing, spear phishing, pharming, vishing, and smishing.

Social engineering, Trojan horse, Man-in-the-middle attack

Malvertising, Ransomware, Keylogging

Phlashing, Whaling, Spoofing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you identify phishing emails?

By providing personal or financial information requested in the email

By checking for suspicious email addresses, misspellings or grammatical errors in the email content, requests for personal or financial information, and unexpected attachments or links.

By clicking on all links and attachments in the email

By ignoring any suspicious email addresses or content

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are some preventive measures to avoid phishing attacks?

Ignoring suspicious emails or messages, clicking on unknown links or downloading attachments from unknown sources, using weak passwords, not enabling two-factor authentication, not keeping software and antivirus programs up to date, and not educating oneself about phishing techniques and how to identify them.

Being cautious of suspicious emails or messages, not clicking on unknown links or downloading attachments from unknown sources, regularly updating and using strong passwords, enabling two-factor authentication, keeping software and antivirus programs up to date, and educating oneself about phishing techniques and how to identify them.

Clicking on any link or downloading any attachment without verifying the source, using the same password for multiple accounts, not updating software and antivirus programs, and not being aware of common phishing tactics.

Trusting all emails and messages received, clicking on any link or downloading any attachment without hesitation, using simple and easily guessable passwords, not enabling any additional security measures, and not staying informed about the latest phishing scams.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to protect personal information online?

To increase online security, To maintain privacy, To avoid online scams

To prevent identity theft, fraud, and unauthorized access to sensitive data.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a phishing attack?

To spread malware and viruses.

To gain unauthorized access to a system.

To deceive individuals into revealing sensitive information.

To promote fake products and services.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are some red flags to look out for in phishing emails?

Suspicious sender email addresses, generic greetings, urgent or threatening language, requests for personal information, spelling and grammatical errors, and suspicious attachments or links.

Emails from unrecognized or suspicious domains, offers that seem too good to be true, requests for password or login credentials, emails that claim to be from a government agency or financial institution

Vague or generic email content, excessive use of exclamation marks or capital letters, requests for immediate action or response, poor formatting or design

Unusual email subject lines, unfamiliar sender names, requests for money or financial information, misspelled company names or logos

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you verify the authenticity of a website to prevent phishing attacks?

Ignore any security warnings from your browser.

Click on any pop-up ads on the website to verify its authenticity.

Check for spelling errors in the website URL.

Verify HTTPS, SSL certificate, trust indicators, domain name, and be cautious of suspicious emails or links.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?