Protect Yourself from Phishing Attacks

Interactive Video
•
Information Technology (IT), Architecture, Social Studies
•
University
•
Hard
Wayground Content
FREE Resource
Read more
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common method used by hackers in phishing attacks?
Using complex algorithms
Developing new software
Hacking into secure servers
Sending emails to trick users
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What percentage of people tend to click on phishing links in campaigns?
50%
25%
4%
10%
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a sign of a phishing email?
No links in the email
Grammatical mistakes
Email from a known domain
Personalized greeting
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What should you check to verify the legitimacy of an email sender?
The length of the email
The time the email was sent
The sender's domain
The color of the email
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common tactic used in phishing emails pretending to be from Amazon?
Offering free products
Asking to claim rewards
Requesting feedback
Sending newsletters
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can you identify a fake Apple website in a phishing attempt?
By the color scheme
By the URL not matching apple.com
By the presence of Apple logo
By the speed of the website
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What should you avoid doing on a suspicious website?
Scrolling through the page
Reading the content
Entering personal information
Closing the browser
Similar Resources on Wayground
8 questions
Web Security: Common Vulnerabilities And Their Mitigation - Social Engineering

Interactive video
•
University
6 questions
How to fight scripting attacks

Interactive video
•
University
3 questions
Other Phishing Techniques

Interactive video
•
University
6 questions
PHISH: Recognizing Phishing Attempts

Interactive video
•
KG - University
3 questions
PHISH: Recognizing Phishing Attempts

Interactive video
•
KG - University
6 questions
Risk Management for Cyber Security Managers - Threats and Adversaries

Interactive video
•
University
6 questions
Home Depot Breach: How Hackers Can Use the Stolen Data

Interactive video
•
University
2 questions
PHISH: Introduction and explanation of Phishing

Interactive video
•
KG - University
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Information Technology (IT)
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)

Quiz
•
8th Grade - University
7 questions
Force and Motion

Interactive video
•
4th Grade - University
36 questions
Unit 5 Key Terms

Quiz
•
11th Grade - University
7 questions
Figurative Language: Idioms, Similes, and Metaphors

Interactive video
•
4th Grade - University
15 questions
Properties of Equality

Quiz
•
8th Grade - University
38 questions
WH - Unit 3 Exam Review*

Quiz
•
10th Grade - University
21 questions
Advise vs. Advice

Quiz
•
6th Grade - University
12 questions
Reading a ruler!

Quiz
•
9th Grade - University