Search Header Logo
Social Engineering

Social Engineering

Assessment

Presentation

Computers

8th Grade

Practice Problem

Easy

Created by

Ayomikun J Sodipe

Used 19+ times

FREE Resource

27 Slides • 29 Questions

1

media

2

media

3

media

4

media

5

media

6

QUESTIONS AHEAD.

7

Multiple Choice

What do you think social engineering?

1

A type of computer virus

2

Manipulating people to obtain confidential information

3

A method of coding

4

A security protocol

8

Multiple Choice

Why is it important to train employees and students about social engineering?

1

To teach them coding skills

2

To increase productivity

3

To help them recognise and avoid manipulation tactics

4

To improve customer service

9

media

10

QUESTIONS AHEAD.

11

Multiple Choice

What is social engineering?

1

A network security protocol

2

A type of malware designed to disrupt systems

3

The manipulation of individuals by hackers to obtain confidential and personal information

4

A method of encrypting data

12

Multiple Choice

Why do you think is social engineering effective?

1

It relies on technical vulnerabilities in software

2

It exploits human psychology and trust

3

It requires advanced hacking skills

4

It uses complex encryption methods

13

Multiple Choice

Which of this following do you think is a common tactic used in phishing attacks?

1

Sending unsolicited text messages

2

Hacking into secure databases

3

Creating fake websites that look legitimate

4

Installing malware on devices

14

Open Ended

What types of personal information do you think are most valuable to cybercriminals, and why?

15

media

16

media

17

media

18

media

19

media

20

media

21

media

22

media

23

media

24

QUESTIONS AHEAD.

25

Multiple Choice

What is malware?

1

A security protocol

2

A form of data encryption

3

A method of social engineering

4

A type of software designed to harm or exploit devices

26

Multiple Choice

What is malware designed to do?

1

Protect systems from attacks

2

Enhance system performance

3

Harm, exploit, or gain unauthorized access to systems

4

Create secure backups of data

27

Multiple Choice

Which of the following is an example of phishing?

1

Flooding a website with traffic

2

Stealing someone’s login credentials in person

3

Sending a fake email to obtain sensitive information

4

Installing a virus on a computer

28

Multiple Choice

What does blagging involve?

1

Sending unsolicited messages

2

Installing malware on a device

3

Hacking into a network

4

Creating a false pretext to obtain confidential information

29

Multiple Choice

What is the primary goal of a Denial of Service (DoS) attack?

1

To make a network or website unavailable to users

2

To steal data from a database

3

To monitor user activity

4

To encrypt files for ransom

30

Open Ended

In your own words, explain what shouldering is

31

Multiple Choice

Which of this type of information is most at risk from social engineering attacks?

1

National Insurance numbers

2

Recipe collections

3

Weather forecasts

4

General news articles

32

Multiple Choice

How might a cybercriminal get data from you?

1

By asking directly for your information in person

2

Through social engineering tactics like phishing or pretexting

3

By hacking your device remotely

4

All of the above

33

ACTIVITY 1:
COMPLETE ALL QUESTIONS
ON CLASS NOTE

34

media

35

media

36

media

37

media

38

QUESTIONS AHEAD.

39

Multiple Choice

What is encryption?

1

A process that converts data into a code to prevent unauthorised access

2

A method of compressing files

3

A way to delete files permanently

4

A type of software used for data recovery

40

Multiple Choice

How does encryption help in securing data during transmission?

1

By permanently deleting data from the source

2

By compressing data to reduce size

3

By encoding data so that it can only be read by authorised parties

4

By converting data into a readable format

41

Multiple Choice

Why is it important to regularly update your software?

1

To improve your computer's speed

2

To make your device look new

3

To protect against security vulnerabilities

4

To avoid unnecessary notifications

42

Multiple Choice

Which action helps minimise the risk of social engineering attacks?

1

Sharing personal information online

2

Using weak passwords

3

Ignoring security updates

4

Reporting suspicious activity

43

Multiple Choice

Which action helps minimise the risk of social engineering attacks?

1

Sharing personal information online

2

Using weak passwords

3

Ignoring security updates

4

Reporting suspicious activity

44

media

45

media

46

QUESTIONS AHEAD.

47

Multiple Choice

What do you think social engineering?

1

A type of computer virus

2

Manipulating people to obtain confidential information

3

A method of coding

4

A security protocol

48

Multiple Choice

Why is social engineering effective?

1

It relies on technical vulnerabilities in software

2

It requires advanced hacking skills

3

It exploits human psychology and trust

4

It uses complex encryption methods

49

Multiple Choice

Which of the following is an example of social engineering?

1

Installing a virus on a computer

2

Overloading a server with traffic

3

Sending an email that appears to be from a bank requesting login information

4

Using antivirus software to protect a device

50

Open Ended

List the types of Cyber attack

51

Multiple Choice

Which of the following is the correct definition of a phishing attack?

1

An attack that blocks access to a network by flooding it with excessive traffic.

2

An attack where cybercriminals secretly monitor online activity to steal data.

3

An attack where hackers gain access to your device by exploiting software vulnerabilities.

4

Attack where fake messages are sent to trick individuals into giving out sensitive information like passwords.

52

Multiple Choice

Which of the following is a common tactic used in phishing attacks?

1

Creating fake social media accounts

2

Sending emails that appear to be from legitimate sources

3

Hacking into secured networks directly

4

Flooding a website with traffic

53

Multiple Choice

Which of the following is the correct definition of a malware attack?

1

An attack where cybercriminals send fraudulent emails to trick users into revealing sensitive data.

2

A type of attack that installs malicious software on a device to disrupt operations or steal information.

3

An attack that overwhelms a network or website with traffic, making it unavailable.

4

An attack where an unauthorized person intercepts communication between two parties.

54

Multiple Choice

Which of the following is the correct definition of a ransomware attack?

1

An attack that overwhelms a system with traffic to prevent access.

2

An attack that tricks users into revealing personal information through deceptive emails.

3

An attack where malware encrypts a user's data, demanding payment to restore access.

4

An attack where a hacker intercepts communication between two users to steal data.

55

Multiple Choice

What is the primary purpose of encryption?

1

To protect sensitive information from unauthorised access

2

To speed up data transmission

3

To create backups of data

4

To improve data quality

56

Multiple Choice

What is a key way to limit the risk of social engineering attacks?

1

Be cautious with unsolicited requests for sensitive information

2

Use weak passwords that are easy to remember

3

Ignore suspicious activity

4

Regularly share personal information on social media

media

Show answer

Auto Play

Slide 1 / 56

SLIDE