Search Header Logo

Social Engineering & Malware

Authored by Joselias Hinojosa

Other

6th - 8th Grade

Used 5+ times

Social Engineering & Malware
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the art of manipulating people into performing actions or divulging confidential information.

Network Engineering

Data Engineering

Social Engineering

Motor Engineering

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hacking is...

a term used to cut flowers
the use of a computer to gain unauthorized access to data in a system.
a term used to laugh at something
a bad word

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When cyber criminals attempt to steal personal and financial information or infect devices with malware and viruses.

Baiting

Phishing Scams

Tailgating

Vishing

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is Vishing?

Exploiting human curiosity via the use of physical media.

Buildings that are secured via key card

Emails can appear to be from a legitimate organization, urging you to act quickly to avoid negative consequences.

The use of fraudulent phone calls to trick people into giving money or revealing personal information

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When websites may offer users free music or movie downloads is called _______________ .

Baiting

Hacking

Vishing

Tailgating

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is an example of tailgating?

When a websites give away free software and include unwanted programs.

When someone pretends to be from a phone company to try and get personal information from the victim.

When someone walks behind an employee of company and tries to get in without a proper ID.

When you get an email from an official looking website to try and get your personal information.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hacker who uses their skills to help protect against attacks are called

Black Hat

Green Hat

Blue Hat

White Hat

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?