
social engineering attacks
Authored by masheal a
University
Used 24+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
5 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
When The attacker compromises the network or system through social interaction with an individual. This is an example of what?
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
All of the following are part of Social Engineering attacks EXCEPT which one?
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which Network attack is also known as packet sniffing?
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following would probably not help to prevent phishing?
Train employees on security procedures
Set up an auto-reply for e-mails received when you are on holiday
Block e-mails from unknown senders
Investigate content of e-mails to determine trustworthiness
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following most closely matches the definition of 'Blagging'?
Sending an e-mail to a user pretending to be someone else
Hacking a person's computer
Tricking a person into revealing some personal information
Observing a legitimate user entering a password
Setting up a fake website that looks like an official website
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?