System Security - Threats posed to networks

System Security - Threats posed to networks

9th - 11th Grade

30 Qs

quiz-placeholder

Similar activities

Computer Security - Topic 1

Computer Security - Topic 1

10th Grade

35 Qs

Chapter 16 Practice Test

Chapter 16 Practice Test

7th Grade - University

30 Qs

Hardware y software

Hardware y software

10th Grade

25 Qs

Komponen Utama Sistem Komputer

Komponen Utama Sistem Komputer

10th Grade

25 Qs

CIBERSEGURIDAD- SENA

CIBERSEGURIDAD- SENA

11th Grade

30 Qs

AP Computer Science Principles Security

AP Computer Science Principles Security

9th - 12th Grade

33 Qs

IGCSE ICT Chapter 8 - Safety & Security

IGCSE ICT Chapter 8 - Safety & Security

9th - 10th Grade

35 Qs

Cyber Security (Cyber security KS4 1-3)

Cyber Security (Cyber security KS4 1-3)

9th Grade - Professional Development

28 Qs

System Security - Threats posed to networks

System Security - Threats posed to networks

Assessment

Quiz

Computers

9th - 11th Grade

Medium

Created by

Rachel Pugh

Used 20+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is not a social engineering technique?

Blagging

Hacking

Phishing

Pharming

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following would probably not help to prevent phishing?

Train employees on security procedures

Set up an auto-reply for e-mails received when you are on holiday

Block e-mails from unknown senders

Investigate content of e-mails to determine trustworthiness

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following most closely matches the definition of 'Blagging'?

Sending an e-mail to a user pretending to be someone else

Hacking a person's computer

Tricking a person into revealing some personal information

Observing a legitimate user entering a password

Setting up a fake website that looks like an official website

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following describe 'Social engineering'?

Confusing people so they give-up information

Manipulating people to give-up information

Assaulting people so they give up information

Paying people so they give-up goods and services

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the term for making a phone call or e-mail that appear to be from somebody else instead of the real sender?

Hoaxing

Spoofing

Blagging

Pancaking

Defenestrating

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following people should you share your password with when they ask?

Network managers

Call centre workers

Security experts

Company managers

Nobody

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following could increase the chances of blagging being successful?

Making the victim feel sorry for you

Complementing the victim

Ignoring the victim

Claiming to be an authority figure

Offering the victim a reward for 'helping'

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?