Network Security - Phishing & Social Engineering

Network Security - Phishing & Social Engineering

8th - 11th Grade

11 Qs

quiz-placeholder

Similar activities

Ôn lại kiến thức  Lớp 3 T13

Ôn lại kiến thức Lớp 3 T13

1st - 10th Grade

10 Qs

Wee Word Intro

Wee Word Intro

7th - 12th Grade

12 Qs

UNIT 1.8 ELCE

UNIT 1.8 ELCE

10th Grade

14 Qs

Access - Lesson 14

Access - Lesson 14

9th - 12th Grade

10 Qs

ICT 10 : Introduction to Adobe Illustrator(CS5)

ICT 10 : Introduction to Adobe Illustrator(CS5)

10th Grade

10 Qs

مراجعة حاسب2 ثلاث وحدات

مراجعة حاسب2 ثلاث وحدات

11th Grade

16 Qs

Algorytmy

Algorytmy

8th Grade

13 Qs

4.6.4 Logic Gates

4.6.4 Logic Gates

10th Grade - Professional Development

15 Qs

Network Security - Phishing & Social Engineering

Network Security - Phishing & Social Engineering

Assessment

Quiz

Computers

8th - 11th Grade

Practice Problem

Medium

Created by

Henry Sanderson

Used 88+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The weakest point in a security system, is usually:

Poorly coded software

People

Unreliable hardware

Poor network connections

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is PHISHING?

Where a device is used to intercept packets of data as they are transferred across a network. This data is then analysed to look for passwords and other personal data.

Where an executable file is secretly installed to record each key pressed and send

Writing a snippet of code to try and retrieve data from a machine

Sending emails pretending to be from reputable companies to try and get people to reveal personal information

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False: Phishing is only done through email. It never uses any other messaging service.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a social engineering technique?

Blagging

Hacking

Phishing

Pharming

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following people should you share your password with when they ask?

Network managers

Call centre workers

Security experts

Company managers

Nobody

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following most closely matches the definition of 'Blagging'?

Sending an e-mail to a user pretending to be someone else

Hacking a person's computer

Tricking a person into revealing some personal information

Observing a legitimate user entering a password

Setting up a fake website that looks like an official website

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which account should have your most secure password?

Bank Account

School Account

Primary Email Account

Social Media Account

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?