
Chapter 4 - Social Engineering
Authored by Madam W
Computers
University
Used 51+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Phishing takes place using.... (Select 2 answers)
Instant messaging
Website
Piggybacking
2.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Training and education of end users can be used to prevent ...(Select 2 answers)
Phishing
Tailgating
Session hijacking
Wireshark
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Phising
Spam
Vishing
Piggybacking
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Social engineering can use all the following except ....
Mobile phone
Instant message
Viruses
Trojan horse
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Social engineering is designed to ...
Manipulate human behavior
Make people distrustful
Negotiate to say yes
Gain a physical advantage
6.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Phishing can be mitigated through the use of ... (Select 2 answers)
Spam filtering
Education
Antivirus
Anti malware
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Read the Question on the image
Phising
Spam
Vishing
Piggybacking
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?