
Social Engineering
Presentation
•
Computers
•
8th Grade
•
Practice Problem
•
Easy
Ayomikun J Sodipe
Used 19+ times
FREE Resource
27 Slides • 29 Questions
1
2
3
4
5
6
QUESTIONS AHEAD.
7
Multiple Choice
What do you think social engineering?
A type of computer virus
Manipulating people to obtain confidential information
A method of coding
A security protocol
8
Multiple Choice
Why is it important to train employees and students about social engineering?
To teach them coding skills
To increase productivity
To help them recognise and avoid manipulation tactics
To improve customer service
9
10
QUESTIONS AHEAD.
11
Multiple Choice
What is social engineering?
A network security protocol
A type of malware designed to disrupt systems
The manipulation of individuals by hackers to obtain confidential and personal information
A method of encrypting data
12
Multiple Choice
Why do you think is social engineering effective?
It relies on technical vulnerabilities in software
It exploits human psychology and trust
It requires advanced hacking skills
It uses complex encryption methods
13
Multiple Choice
Which of this following do you think is a common tactic used in phishing attacks?
Sending unsolicited text messages
Hacking into secure databases
Creating fake websites that look legitimate
Installing malware on devices
14
Open Ended
What types of personal information do you think are most valuable to cybercriminals, and why?
15
16
17
18
19
20
21
22
23
24
QUESTIONS AHEAD.
25
Multiple Choice
What is malware?
A security protocol
A form of data encryption
A method of social engineering
A type of software designed to harm or exploit devices
26
Multiple Choice
What is malware designed to do?
Protect systems from attacks
Enhance system performance
Harm, exploit, or gain unauthorized access to systems
Create secure backups of data
27
Multiple Choice
Which of the following is an example of phishing?
Flooding a website with traffic
Stealing someone’s login credentials in person
Sending a fake email to obtain sensitive information
Installing a virus on a computer
28
Multiple Choice
What does blagging involve?
Sending unsolicited messages
Installing malware on a device
Hacking into a network
Creating a false pretext to obtain confidential information
29
Multiple Choice
What is the primary goal of a Denial of Service (DoS) attack?
To make a network or website unavailable to users
To steal data from a database
To monitor user activity
To encrypt files for ransom
30
Open Ended
In your own words, explain what shouldering is
31
Multiple Choice
Which of this type of information is most at risk from social engineering attacks?
National Insurance numbers
Recipe collections
Weather forecasts
General news articles
32
Multiple Choice
How might a cybercriminal get data from you?
By asking directly for your information in person
Through social engineering tactics like phishing or pretexting
By hacking your device remotely
All of the above
33
ACTIVITY 1:
COMPLETE ALL QUESTIONS
ON CLASS NOTE
34
35
36
37
38
QUESTIONS AHEAD.
39
Multiple Choice
What is encryption?
A process that converts data into a code to prevent unauthorised access
A method of compressing files
A way to delete files permanently
A type of software used for data recovery
40
Multiple Choice
How does encryption help in securing data during transmission?
By permanently deleting data from the source
By compressing data to reduce size
By encoding data so that it can only be read by authorised parties
By converting data into a readable format
41
Multiple Choice
Why is it important to regularly update your software?
To improve your computer's speed
To make your device look new
To protect against security vulnerabilities
To avoid unnecessary notifications
42
Multiple Choice
Which action helps minimise the risk of social engineering attacks?
Sharing personal information online
Using weak passwords
Ignoring security updates
Reporting suspicious activity
43
Multiple Choice
Which action helps minimise the risk of social engineering attacks?
Sharing personal information online
Using weak passwords
Ignoring security updates
Reporting suspicious activity
44
45
46
QUESTIONS AHEAD.
47
Multiple Choice
What do you think social engineering?
A type of computer virus
Manipulating people to obtain confidential information
A method of coding
A security protocol
48
Multiple Choice
Why is social engineering effective?
It relies on technical vulnerabilities in software
It requires advanced hacking skills
It exploits human psychology and trust
It uses complex encryption methods
49
Multiple Choice
Which of the following is an example of social engineering?
Installing a virus on a computer
Overloading a server with traffic
Sending an email that appears to be from a bank requesting login information
Using antivirus software to protect a device
50
Open Ended
List the types of Cyber attack
51
Multiple Choice
Which of the following is the correct definition of a phishing attack?
An attack that blocks access to a network by flooding it with excessive traffic.
An attack where cybercriminals secretly monitor online activity to steal data.
An attack where hackers gain access to your device by exploiting software vulnerabilities.
Attack where fake messages are sent to trick individuals into giving out sensitive information like passwords.
52
Multiple Choice
Which of the following is a common tactic used in phishing attacks?
Creating fake social media accounts
Sending emails that appear to be from legitimate sources
Hacking into secured networks directly
Flooding a website with traffic
53
Multiple Choice
Which of the following is the correct definition of a malware attack?
An attack where cybercriminals send fraudulent emails to trick users into revealing sensitive data.
A type of attack that installs malicious software on a device to disrupt operations or steal information.
An attack that overwhelms a network or website with traffic, making it unavailable.
An attack where an unauthorized person intercepts communication between two parties.
54
Multiple Choice
Which of the following is the correct definition of a ransomware attack?
An attack that overwhelms a system with traffic to prevent access.
An attack that tricks users into revealing personal information through deceptive emails.
An attack where malware encrypts a user's data, demanding payment to restore access.
An attack where a hacker intercepts communication between two users to steal data.
55
Multiple Choice
What is the primary purpose of encryption?
To protect sensitive information from unauthorised access
To speed up data transmission
To create backups of data
To improve data quality
56
Multiple Choice
What is a key way to limit the risk of social engineering attacks?
Be cautious with unsolicited requests for sensitive information
Use weak passwords that are easy to remember
Ignore suspicious activity
Regularly share personal information on social media
Show answer
Auto Play
Slide 1 / 56
SLIDE
Similar Resources on Wayground
52 questions
Conosci Windows?
Presentation
•
9th Grade
49 questions
Mobile App vs. Mobile Website
Presentation
•
8th Grade
53 questions
MASA PENDUDUKAN JEPANG
Presentation
•
8th Grade
53 questions
French Foods and Dining Customs
Presentation
•
8th Grade
55 questions
Earth Science Review Lesson
Presentation
•
8th Grade
55 questions
Science TCAP Practice
Presentation
•
8th Grade
51 questions
Unit 1 Weather Review
Presentation
•
7th Grade
50 questions
Biomes and Ecosystems
Presentation
•
7th Grade
Popular Resources on Wayground
16 questions
Grade 3 Simulation Assessment 2
Quiz
•
3rd Grade
19 questions
HCS Grade 5 Simulation Assessment_1 2526sy
Quiz
•
5th Grade
10 questions
Cinco de Mayo Trivia Questions
Interactive video
•
3rd - 5th Grade
17 questions
HCS Grade 4 Simulation Assessment_2 2526sy
Quiz
•
4th Grade
24 questions
HCS Grade 5 Simulation Assessment_2 2526sy
Quiz
•
5th Grade
13 questions
Cinco de mayo
Interactive video
•
6th - 8th Grade
20 questions
Math Review
Quiz
•
3rd Grade
30 questions
GVMS House Trivia 2026
Quiz
•
6th - 8th Grade