
Cybersecurity - Malware and Phishing
Authored by Ramon Torres
Computers
9th - 12th Grade
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is a common technique used by scammers in phishing attacks?
Sending emails with perfect grammar and spelling.
Using fake websites that look like legitimate ones.
Offering free services without any conditions.
Providing detailed contact information for verification.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a red flag that an online offer might be a scam?
The offer is available for a limited time only.
The offer requires payment through a secure website.
The offer promises high returns with little risk.
The offer is from a well-known company.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
How can enabling F2A (Two-Factor Authentication) help protect your online accounts?
It makes your password more complex.
It requires a second form of verification, making it harder for unauthorized access.
It automatically changes your password every month.
It allows you to log in from multiple devices simultaneously.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following actions should you take if you suspect an email is a phishing attempt?
Click on the link to verify its authenticity.
Reply to the email asking for more information.
Delete the email and report it to your email provider.
Forward the email to your friends for their opinion.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Identity theft is a crime in which your private information is stolen and used for ________ activity.
Hidden
Criminal
Advertising
News
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
You see a contest that reads, "Win $10,000 instantly! Click this link to sign up!" You click on the link, and the website asks for your name, address, and email to enter the contest. Why could it be unsafe to share your private information?
You could no longer be you.
Someone could steal your information to create a fake identity pretending to be you.
Someone could give you a lot of money.
Your information would be safe because you're sharing the information online.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Is this a legitimate email or an example of phishing?
Legitimate email
Phishing
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
25 questions
Keamanan Jaringan 1
Quiz
•
11th Grade
25 questions
Unions in C Programming
Quiz
•
10th Grade
32 questions
Tabulky - 2
Quiz
•
8th - 9th Grade
26 questions
Report Builder
Quiz
•
10th Grade
30 questions
Битва умов
Quiz
•
7th - 11th Grade
29 questions
Dzień bezpiecznego Internetu
Quiz
•
12th Grade
26 questions
Hardware Komputer
Quiz
•
10th Grade - University
25 questions
Berpikir Komputasional
Quiz
•
9th Grade
Popular Resources on Wayground
8 questions
Spartan Way - Classroom Responsible
Quiz
•
9th - 12th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
14 questions
Boundaries & Healthy Relationships
Lesson
•
6th - 8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
3 questions
Integrity and Your Health
Lesson
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
9 questions
FOREST Perception
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
Discover more resources for Computers
10 questions
Navigating Digital Citizenship and Online Safety
Interactive video
•
6th - 10th Grade
20 questions
Computer / Internet Companies
Quiz
•
9th Grade
10 questions
Exploring the Basics of Google Sheets
Interactive video
•
9th Grade
10 questions
Exponent Rules
Quiz
•
9th - 12th Grade
20 questions
JavaScript - Karel
Quiz
•
9th - 10th Grade