Y9 Social Engineering

Y9 Social Engineering

9th Grade

10 Qs

quiz-placeholder

Similar activities

Network Security - Phishing & Social Engineering

Network Security - Phishing & Social Engineering

8th - 11th Grade

11 Qs

E-safety

E-safety

6th Grade - Professional Development

15 Qs

Security of Data-Phishing

Security of Data-Phishing

9th - 11th Grade

10 Qs

Cybersecurity vocab :)

Cybersecurity vocab :)

1st Grade - Professional Development

15 Qs

TAHS Y9 38 mixed

TAHS Y9 38 mixed

9th - 12th Grade

11 Qs

Lesson 10 - Threats to Data

Lesson 10 - Threats to Data

9th Grade

14 Qs

Phishing

Phishing

7th - 9th Grade

15 Qs

DETECTING AND PREVENTING CYBER SECURITY THREATS

DETECTING AND PREVENTING CYBER SECURITY THREATS

9th - 12th Grade

15 Qs

Y9 Social Engineering

Y9 Social Engineering

Assessment

Quiz

Computers

9th Grade

Hard

Used 164+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How are people targeted through Phishing?

via Email

on Websites

2.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of these are warning signs of a phishing scam?

incorrect "from" address

Pressure to rush

Social Pressures

Suspicious links in the email

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Social Engineering takes advantage of which security flaw in a computer system?

The User

The Network

The Password

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What cyber scam is described by this statement - "a cyber attack intended to redirect a website's traffic to another, fake site."

Phishing

Pharming

DNS Hijacking

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What cyber scam is described by this statement - " fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising as a trustworthy entity in an electronic communication."

Phishing

Pharming

DNS Hijacking

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How are people targeted through Pharming?

via Email

on Websites

7.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Media Image

Which Social Engineering Techniques can be seen in this email?

Social Pressure - Legal Authority

Financial Pressure

Threat

Blackmail

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?