Network Security - Phishing & Social Engineering

Network Security - Phishing & Social Engineering

8th - 11th Grade

11 Qs

quiz-placeholder

Similar activities

EXAMEN-2°AÑO-INFORMATICA P3-2021

EXAMEN-2°AÑO-INFORMATICA P3-2021

1st - 9th Grade

13 Qs

Hệ Điều Hành Của Máy Tính

Hệ Điều Hành Của Máy Tính

10th Grade - University

10 Qs

3rd week g9 summative

3rd week g9 summative

7th - 12th Grade

15 Qs

Kiểm tra TX tin 8

Kiểm tra TX tin 8

8th Grade

10 Qs

JAVA IDENTIFIERS

JAVA IDENTIFIERS

6th - 8th Grade

14 Qs

PITD Assessment

PITD Assessment

8th Grade

10 Qs

Informática 903 Segundo Trimestre- 2024

Informática 903 Segundo Trimestre- 2024

9th Grade

10 Qs

Mengenal Jendela dan Ikon Microsoft Excel

Mengenal Jendela dan Ikon Microsoft Excel

7th Grade - University

15 Qs

Network Security - Phishing & Social Engineering

Network Security - Phishing & Social Engineering

Assessment

Quiz

Computers

8th - 11th Grade

Practice Problem

Medium

Created by

Henry Sanderson

Used 88+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The weakest point in a security system, is usually:

Poorly coded software

People

Unreliable hardware

Poor network connections

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is PHISHING?

Where a device is used to intercept packets of data as they are transferred across a network. This data is then analysed to look for passwords and other personal data.

Where an executable file is secretly installed to record each key pressed and send

Writing a snippet of code to try and retrieve data from a machine

Sending emails pretending to be from reputable companies to try and get people to reveal personal information

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False: Phishing is only done through email. It never uses any other messaging service.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a social engineering technique?

Blagging

Hacking

Phishing

Pharming

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following people should you share your password with when they ask?

Network managers

Call centre workers

Security experts

Company managers

Nobody

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following most closely matches the definition of 'Blagging'?

Sending an e-mail to a user pretending to be someone else

Hacking a person's computer

Tricking a person into revealing some personal information

Observing a legitimate user entering a password

Setting up a fake website that looks like an official website

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which account should have your most secure password?

Bank Account

School Account

Primary Email Account

Social Media Account

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?