Network Security - Phishing & Social Engineering

Network Security - Phishing & Social Engineering

8th - 11th Grade

11 Qs

quiz-placeholder

Similar activities

conditional constructs in Java

conditional constructs in Java

10th Grade

10 Qs

Internet

Internet

7th - 10th Grade

10 Qs

Kuis tipedata, flowchart informatima kelas X j4njang SMA

Kuis tipedata, flowchart informatima kelas X j4njang SMA

9th - 12th Grade

10 Qs

ÔN TẬP HKII-02

ÔN TẬP HKII-02

8th Grade

15 Qs

Accessing the Internet

Accessing the Internet

9th - 10th Grade

15 Qs

Grade 11 Term 4 Practice 2

Grade 11 Term 4 Practice 2

11th Grade

10 Qs

Los periféricos del computador

Los periféricos del computador

1st Grade - Professional Development

9 Qs

Micro:bit assessment 1

Micro:bit assessment 1

7th - 8th Grade

10 Qs

Network Security - Phishing & Social Engineering

Network Security - Phishing & Social Engineering

Assessment

Quiz

Computers

8th - 11th Grade

Medium

Created by

Henry Sanderson

Used 88+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The weakest point in a security system, is usually:

Poorly coded software

People

Unreliable hardware

Poor network connections

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is PHISHING?

Where a device is used to intercept packets of data as they are transferred across a network. This data is then analysed to look for passwords and other personal data.

Where an executable file is secretly installed to record each key pressed and send

Writing a snippet of code to try and retrieve data from a machine

Sending emails pretending to be from reputable companies to try and get people to reveal personal information

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False: Phishing is only done through email. It never uses any other messaging service.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a social engineering technique?

Blagging

Hacking

Phishing

Pharming

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following people should you share your password with when they ask?

Network managers

Call centre workers

Security experts

Company managers

Nobody

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following most closely matches the definition of 'Blagging'?

Sending an e-mail to a user pretending to be someone else

Hacking a person's computer

Tricking a person into revealing some personal information

Observing a legitimate user entering a password

Setting up a fake website that looks like an official website

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which account should have your most secure password?

Bank Account

School Account

Primary Email Account

Social Media Account

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers