Mr.Fox

Page 34

يجب كتابة الاسم الثلاثي بشكل صحيح
تأكد من كتابة رقم الموبايل بشكل صحيح
يجب اختيار المدينة

إختر الإجابة الصحيحة

Question No - 1

Phishing is a type of attack that happens over the Internet. Users receive an email or text message that seems like it came from a trusted source. These users are being deceived. They are interacting with dangerous hackers. The attackers copy trusted companies. They send users to web pages that look like the ones we use every day. When users login or provide sensitive information, the attackers steal this data. Attackers want your data for many reasons. They may use your data to commit identity fraud. This is when they use your identity to buy something with your credit. Then they receive the goods and you receive the bill. Or they may want your password to take over a computer network. They may want access to private emails. They may want customer records. They gain access by tricking people into giving them their login info. Phishing attacks are dangerous, but you can spot them if you pay attention. One thing to watch is your address bar in your browser. Attackers use domains that look like the ones that we trust, but they are not the same. Phishing attacks are scary and common. The reason why they are common is that they are effective. Many people accept appearances without suspicion. Browsing the Internet safely requires a healthy amount of suspicion. Not everything is what it appears. Nobody is trying to give you free money. Don't trust; verify. 1) The suitable title for the passage is ……

This question must be answered
Question No - 2

2) The underlined words "sensitive information" implies ……..

This question must be answered
Question No - 3

3) The underlined word "Spot" is closest in meaning to ……..

This question must be answered
Question No - 4

4) The main idea of the second paragraph is …….

This question must be answered
Question No - 5

5) Which of the following is considered a phishing attack?

This question must be answered
Question No - 6

6) ……… is NOT a motive or reason for phishing mentioned in the text.

This question must be answered
Question No - 7

7) Which is NOT discussed by the author?

This question must be answered
Question No - 8

8) Which statement is correct?

This question must be answered
Exam submitted successfully
One or more errors above