4.1 Social Engineering

4.1 Social Engineering

9th - 11th Grade

11 Qs

quiz-placeholder

Similar activities

Topic Area 4: Identify the Threat

Topic Area 4: Identify the Threat

9th - 10th Grade

10 Qs

Quiz on Social Engineering

Quiz on Social Engineering

9th Grade

15 Qs

CompTIA Security+ Chapter 17 Study Guide

CompTIA Security+ Chapter 17 Study Guide

9th - 12th Grade

14 Qs

Threats and Social Engineering

Threats and Social Engineering

9th - 10th Grade

10 Qs

Unit 2 -Cyber

Unit 2 -Cyber

9th - 12th Grade

15 Qs

Horváthová inf2

Horváthová inf2

9th Grade

10 Qs

BTEC DIT C3 LAB - Data Level Protection 1

BTEC DIT C3 LAB - Data Level Protection 1

10th - 11th Grade

10 Qs

Security risk (Grade 11 IGCSE)

Security risk (Grade 11 IGCSE)

10th - 11th Grade

14 Qs

4.1 Social Engineering

4.1 Social Engineering

Assessment

Quiz

Computers

9th - 11th Grade

Medium

Created by

Jenny Sharp

Used 139+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why do we get caught by social engineering?

We are too stupid

We are too trusting

We can't learn about it

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is this an example of?

Phishing

Pharming

Baiting

Pretexting

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Scamming someone into giving private/personal information to 'confirm their identity', pretending they need information to help them.

Baiting

Pretexting

Quid pro quo

Shoulder surfing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When someone promises free goods in exchange for personal information e.g. promise of a free download in return for log-in details.

Pretexting

Quid pro quo

Baiting

Phishing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When you are offered a service in exchange for personal details. Typically a cold phone call where you are told your computer has an issue and you need help from IT support.

Baiting

Quid pro quo

Pretexting

Shoulder surfing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Getting physical access to a room where you don't have access by following someone.

Phishing

Pretexting

Shoulder surfing

Tailgating / piggybacking

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which technique uses emails or texts containing a link to a fake website to then steal your security or login details?

Phishing

Pharming

Baiting

Pretexting

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?