Phishing

Reading Comprehension Quiz

Answer the Short Response Questions?
Yes    No
Enter your first and last name to get credit.
Your name will be printed on your score sheet.

Continue

Phishing
Correct!
Incorrect!
Which is a phishing attack?
Sneaking into a concert without paying
Tricking someone into giving away sensitive data
Throwing water on an adversary's computer
Buying something with someone else's credit
Submit
Phishing
Correct!
Incorrect!
What is the difference between a phishing and spear phishing attack?
A phishing attack is illegal while spear phishing is legal.
A phishing attack is more convincing than a spear phishing attack.
A spear phishing attack is targeted while phishing is random.
A spear phishing attack involves theft or identity fraud and phishing does not.
Submit
How do you know this? Refer to the text in your answer.
Submit
Phishing
Correct!
Incorrect!
Which is NOT a motive or reason for phishing mentioned in the text?
To steal private communication or records
To commit identity fraud
To disarm home alarm systems
To gain control of someone else's computer network
Submit
Phishing
Correct!
Incorrect!
How can 2FA protect users from phishing attacks?
Nobody can log into the account under any circumstances.
Two people have to approve the login, so the attacker can't do it alone.
The attacker needs a fingerprint or eyeball scan to access the account.
Users need two keys to login, and the user can't give away one of the keys.
Submit
How do you know this? Cite the text in your answer.
Submit
Phishing
Correct!
Incorrect!
Which statement would the author most likely AGREE with?
In a spear phishing attack, the attacker erases the victim's identity.
In a phishing attack, an attacker overpowers a victim with a stronger computer.
Every phishing attack involves stealing the victim's identity to commit fraud.
If a phishing attack is successful, users willingly give attackers sensitive data.
Submit
Why do you believe this? Refer to the text in your answer.
Submit
Phishing
Correct!
Incorrect!
Which statement would the author most likely DISAGREE with?
You should check your address bar carefully before submitting your data.
Some links send users to phony sites designed to steal passwords.
The domains 'google.com' and 'accounts-google.com' go to the same place.
Hilary Clinton's campaign team was spear phished in 2016.
Submit
Phishing
Correct!
Incorrect!
Which best describes the main idea of the THIRD paragraph?
To describe the reasons for phishing attacks
To teach readers how to defend against phishing attacks
To compare and contrast phishing and spear phishing
To explain how phishing attacks are executed
Submit
Phishing
Correct!
Incorrect!
Why does the author discuss 2FA?
To impress readers by using technical terms
To entertain readers by telling a short story
To persuade readers to not use the Internet
To inform readers about how to protect themselves
Submit
Phishing
Correct!
Incorrect!
Which is NOT discussed by the author?
How to protect oneself against phishing attacks
Which computers work best for phishing attacks
How a spear phishing is different from phishing
Reasons why people commit phishing attacks
Submit
Phishing
Correct!
Incorrect!
With which statement would the author most likely AGREE?
The Internet is too dangerous for regular people to use.
Using 2FA does NOT help to protect against phishing attacks.
A company's logo on a web page means that the site is safe.
A safe Internet user is suspicious of links.
Submit
Why do you believe this? Explain your answer in complete sentences.
Submit
Phishing
Correct!
Incorrect!
Explain in your own words what 2FA is and how it protects users against phishing attacks.
Submit
Phishing
Correct!
Incorrect!
What is the difference between a phishing and spear phishing attack? Which is more dangerous and why do you think that?
Submit

Results

Phishing

Questions Wrong:
Average Right:
Time Spent:
Read the Text