Page 41 - Cyber Safety C-5
P. 41
3. Identify the most appropriate action to take if you suspect you've been phished.
(i) Change passwords (ii) Share password
(iii) Ignore email (iv) Click the link
4. Choose the most common indicator that an email may be a phishing attempt.
(i) A familiar link (ii) A trusted email
(iii) Misspelled words (iv) A well-structured message
5. Mark the consequence of falling for a phishing scam.
(i) Faster internet (ii) Free courses
(iii) Unchanged bank account (iv) Loss of data
B. Write ‘T’ for true and ‘F’ for false.
1. Phishing is a legitimate process used by companies to collect customer data.
2. A pop-up message asking for personal details can be a sign of phishing.
3. Smishing is a type of phishing attack that occurs through emails.
4. Phishing emails often promise unrealistic rewards such as free money or prizes.
5. Two-factor authentication can help protect you from phishing attacks.
C. Fill in the blanks using the given hints:
1. Phishing is a common online trick used to fool people into sharing Hints
information.
Spear
2. A password is your first line of defence against urgency
phishing. official
3. phishing is a targeted form of phishing where the strong
attacker customises their approach. personal
4. When you receive a suspicious message, it’s safer to visit the
website directly.
5. A phishing message often creates to trick you into acting quickly.
D. Answer the following questions:
1. What is the goal of Phishing?
Phishing: Don't Get Hooked 39

