Cyber Security and Social Engineering

Cyber Security and Social Engineering

9th - 11th Grade

18 Qs

quiz-placeholder

Similar activities

EmTech Q2 Post Test 2

EmTech Q2 Post Test 2

11th Grade

15 Qs

Y9 Creative iMedia RO81 Quiz Part 1

Y9 Creative iMedia RO81 Quiz Part 1

9th Grade

21 Qs

Komunikasi dalam Jaringan

Komunikasi dalam Jaringan

10th - 12th Grade

21 Qs

Repaso TIC- 1º-bach

Repaso TIC- 1º-bach

11th Grade

20 Qs

CSS 10 - QUIZ

CSS 10 - QUIZ

10th Grade

20 Qs

Accessing the Internet

Accessing the Internet

9th - 10th Grade

15 Qs

CHỦ ĐỀ A. MÁY TÍNH VÀ XÃ HỘI TRÍ THỨC P1

CHỦ ĐỀ A. MÁY TÍNH VÀ XÃ HỘI TRÍ THỨC P1

10th Grade

20 Qs

CSS GRADE 9 - QUIZ PECs and EM

CSS GRADE 9 - QUIZ PECs and EM

9th Grade

20 Qs

Cyber Security and Social Engineering

Cyber Security and Social Engineering

Assessment

Quiz

Computers

9th - 11th Grade

Practice Problem

Hard

Used 32+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the most COMMON method of social engineering?

Phishing

Pretexting

Baiting

Tailgating

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is this?


A person releases a music file for free download. The file, when opened, plays a song while secretly installing a piece of malware. What is this called?

Keylogger

Virus

Trojan

Worm

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is this?


A user is contacted by email asking them to fill in a survey, if they complete the form they are entered into a prize draw for a 7 nights 5 star holiday experience.

Baiting

Phishing

Quid pro Quo

Pretexting

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What does social engineering use on its targets to trick or persuade them into doing what the person wants them to do?

The Force

Sophisticated Software

Psychology

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of these words represent the biggest weakness in a computer system.

Hardware

Software

Wetware

Malware

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is this?


A person lays in wait, looking for an oppotunity to follow someone inside a secured building.

Tailgaiting

Phishing

Baiting

Pretexting

7.

MULTIPLE SELECT QUESTION

20 sec • 1 pt

Which of these below are pieces of Malware

iTunes

Trojan

Word Processor

Spyware

Computer Virus

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?