Network Security - Phishing & Social Engineering

Network Security - Phishing & Social Engineering

8th - 11th Grade

11 Qs

quiz-placeholder

Similar activities

Introducción Redes Tele1 IB

Introducción Redes Tele1 IB

10th Grade - University

15 Qs

Contact Center Sevices

Contact Center Sevices

7th - 10th Grade

10 Qs

Questionário Aula 6 - Int. à Inf. (Segurança e Proteção)

Questionário Aula 6 - Int. à Inf. (Segurança e Proteção)

10th Grade

10 Qs

Fondo de pantalla

Fondo de pantalla

10th Grade

10 Qs

Inteligencia Artificial

Inteligencia Artificial

6th - 8th Grade

15 Qs

bài tập câu lệnh đk

bài tập câu lệnh đk

8th Grade

15 Qs

ICT as Platform for Change

ICT as Platform for Change

11th - 12th Grade

10 Qs

Visual Basic 2010

Visual Basic 2010

8th Grade - University

10 Qs

Network Security - Phishing & Social Engineering

Network Security - Phishing & Social Engineering

Assessment

Quiz

Computers

8th - 11th Grade

Practice Problem

Medium

Created by

Henry Sanderson

Used 88+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The weakest point in a security system, is usually:

Poorly coded software

People

Unreliable hardware

Poor network connections

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is PHISHING?

Where a device is used to intercept packets of data as they are transferred across a network. This data is then analysed to look for passwords and other personal data.

Where an executable file is secretly installed to record each key pressed and send

Writing a snippet of code to try and retrieve data from a machine

Sending emails pretending to be from reputable companies to try and get people to reveal personal information

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False: Phishing is only done through email. It never uses any other messaging service.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a social engineering technique?

Blagging

Hacking

Phishing

Pharming

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following people should you share your password with when they ask?

Network managers

Call centre workers

Security experts

Company managers

Nobody

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following most closely matches the definition of 'Blagging'?

Sending an e-mail to a user pretending to be someone else

Hacking a person's computer

Tricking a person into revealing some personal information

Observing a legitimate user entering a password

Setting up a fake website that looks like an official website

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which account should have your most secure password?

Bank Account

School Account

Primary Email Account

Social Media Account

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?