This quiz is incomplete! To play this quiz, please finish editing it.
Delete Quiz
This quiz is incomplete! To play this quiz, please finish editing it.
18 QuestionsShow answers
Question 1
SURVEY
30 seconds
Q. What is phishing?
answer choices
scams through websites
scams through emails
scams through phone calls
scams through text messages
Question 2
SURVEY
30 seconds
Q. What is suspicious about this email?
answer choices
Generic greeting
URL does not match
all the above
Question 3
SURVEY
30 seconds
Q. Is this site authentic?
answer choices
Yes
No
Question 4
SURVEY
30 seconds
Q. Sara finds a message on her phone that she thinks might be a scam. She should:
answer choices
Forward the message to her friends to see if they think it's a scam too.
Reply and ask the sender not to send more mail.
Delete the message.
Question 5
SURVEY
30 seconds
Q. When people send you phony emails, pop-up messages, social media messages, texts, calls, or links to fake websites in order to hook you into giving out your personal and financial information.
answer choices
Plagiarizing
Skimming
Phishing
Identity Theft
Question 6
SURVEY
30 seconds
Q. Select the Phishing Schemes that apply to the following email: From: no_reply@emailinternet.chase.com Subject: Account Status Attention US Bank Customer, Due to a recent security check on your account, we require you to confirm your details. Failure to do so within 24 hours will lead to account suspension. Sorry for the inconveenince. Click here to confirm your account
Regards, US Bank Online Customer Service This email has been sent by US Bank.
answer choices
Generic greeting & Link to email
Sense of urgency & Spelling errors
Need to verify account info
ALL of the previous choices are in the email.
Question 7
SURVEY
30 seconds
Q. Teens are some of the most frequent targets of identity theft and other scams. Why?
answer choices
Identity thieves look for “clean” Social Security numbers that haven’t yet been used to get credit.
Thieves want to help teens get student loans for college
It will help teens do better in school
Identity thieves are just testing teens to see if they will fall for their scams
Question 8
SURVEY
30 seconds
Q. Pretending to be banks, the IRS or some other organization and sending you an email or a letter (or even make a phone call) asking for personal information is called
answer choices
Surfing
Fishing
Phishing
Sailing
Question 9
SURVEY
30 seconds
Q. They may get into your computer or another computer system, including schools, credit card companies, and other places maintaining personal information.
answer choices
Hoping
Heaving
Hacking
Heckling
Question 10
SURVEY
30 seconds
Q. To prevent identity theft use one of these on credit card, bank and cell phone accounts.
answer choices
Combination lock
Password
A piece of tape to cover up the number
A fake name
Question 11
SURVEY
30 seconds
Q. Never give this out over the phone, through email or on the Internet.
answer choices
Personal Information
Free money
Tomorrow's lunch choices
Baseball scores
Question 12
SURVEY
30 seconds
Q. What is a phishing scam?
answer choices
Someone trying to log your keys
YOU SPELLED FISHING WRONG SIR!
Someone sending you a virus
Someone pretending to be a legitimate business
Question 13
SURVEY
30 seconds
Q. What is the most common way to receive a phishing scam?
answer choices
Text message
Email
Downloading films
Unsafe wesbites
Question 14
SURVEY
30 seconds
Q. How can you detect a phishing scam?
answer choices
The companies logo is on the email
The email asks for information the company should already know
The email is sent directly to you
The email ends with @paypal.co.uk
Question 15
SURVEY
60 seconds
Q. Which is NOT a phishing feature?
answer choices
sense of urgency
addressed to you
link to website
generic greeting
Question 16
SURVEY
60 seconds
Q. Phishing is
answer choices
using a fishing pole to catch fish.
luring someone into giving out private information.
pretending to be someone you're not.
being at high risk of attack or harm
Question 17
SURVEY
60 seconds
Q. The best way to avoid phishing is to
answer choices
be skeptical about any online requests for personal information.
stay off social media.
not share your email address.
use the same password for all accounts.
Question 18
SURVEY
60 seconds
Q. If you receive a suspicious email, you should
answer choices
open it up and click on any links.
reply to the sender asking them to leave you alone.