022_Phishing – CompTIA Security+ SY0-701 – 2.2

022_Phishing – CompTIA Security+ SY0-701 – 2.2

12th Grade

20 Qs

quiz-placeholder

Similar activities

025_Other Social Engineering Attacks–CompTIA Security+ SY0-701

025_Other Social Engineering Attacks–CompTIA Security+ SY0-701

9th - 12th Grade

20 Qs

Using Email

Using Email

9th - 12th Grade

15 Qs

Domains 1-2 Sec+

Domains 1-2 Sec+

12th Grade

25 Qs

Final cybersecurity exam (A)

Final cybersecurity exam (A)

9th - 12th Grade

21 Qs

Social Engineering Attacks

Social Engineering Attacks

9th - 12th Grade

17 Qs

023_Impersonation – CompTIA Security+ SY0-701 – 2.2

023_Impersonation – CompTIA Security+ SY0-701 – 2.2

9th - 12th Grade

20 Qs

Malware

Malware

9th - 12th Grade

19 Qs

E-mail

E-mail

5th - 12th Grade

17 Qs

022_Phishing – CompTIA Security+ SY0-701 – 2.2

022_Phishing – CompTIA Security+ SY0-701 – 2.2

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Wayground Content

Used 4+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a sign of a phishing email?

Well-structured content with no errors

Poor formatting, inconsistent fonts, or spelling mistakes

Professional language and tone

Clear and concise subject line

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is typosquatting?

A method of securing a domain name for future use.

A phishing method where attackers register domain names with slight misspellings.

A technique used to improve website SEO rankings.

A strategy for creating fake social media accounts.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is vishing?

Phishing attacks carried out over the phone

Phishing attacks via email

Phishing attacks through social media

Phishing attacks using text messages

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do attackers misuse phone verification codes?

They trick victims into providing two-factor authentication (2FA) codes

They use them to reset passwords without permission

They send them to unauthorized devices for access

They store them for future phishing attacks

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can multi-factor authentication (MFA) help prevent phishing attacks?

It requires an additional verification step, making it harder for attackers to gain access.

It allows users to change their passwords more frequently.

It automatically detects and blocks phishing websites.

It provides a backup email for account recovery.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one way to verify a sender’s email address?

Check the sender's email for typos

Hover over the sender's email to check for inconsistencies

Reply to the email asking for confirmation

Look for a phone number in the email signature

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common tactic used in phishing attacks?

Asking users to reset their passwords for security reasons

Sending emails that look like they come from legitimate companies

Using fake login pages that mimic real ones

All of the above

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers