Y9 Hwk Quiz 1 (Social Engineering)

Quiz
•
Computers
•
9th Grade
•
Hard
Mr Renshaw
Used 29+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The email above may be what type of attack?
Shouldering
Phishing
Blagging
Hacking
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
‘A set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes’ is a definition of which of the following key terms?
Shouldering
Phishing
Blagging
Social Engineering
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is when attackers create short, fun quizzes in an attempt to find out key pieces of information that can help them answer account security questions?
Blagging
Shouldering
Name generator attack
Phishing
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Shouldering is...
the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.
the attacker watching the victim while they provide sensitive information
he victim is asked in an app or a social media post to combine a few pieces of information or complete a short quiz to produce a name.
the perpetrator invents a scenario in order to convince the victim to give them data or money.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
phishing is...
the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.
the attacker watching the victim while they provide sensitive information
he victim is asked in an app or a social media post to combine a few pieces of information or complete a short quiz to produce a name.
the perpetrator invents a scenario in order to convince the victim to give them data or money.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
name generator attacks are...
the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.
the attacker watching the victim while they provide sensitive information
he victim is asked in an app or a social media post to combine a few pieces of information or complete a short quiz to produce a name.
the perpetrator invents a scenario in order to convince the victim to give them data or money.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
blagging is...
the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.
the attacker watching the victim while they provide sensitive information
he victim is asked in an app or a social media post to combine a few pieces of information or complete a short quiz to produce a name.
the perpetrator invents a scenario in order to convince the victim to give them data or money.
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
Cybersecurity threats 1

Quiz
•
9th Grade
14 questions
1.4 - Network Attacks

Quiz
•
7th - 12th Grade
11 questions
Year 9 Unit 1 Cybersecurity

Quiz
•
9th Grade
11 questions
Network Security - Phishing & Social Engineering

Quiz
•
8th - 11th Grade
20 questions
Cyber Security

Quiz
•
9th - 12th Grade
10 questions
Understanding Cybersecurity

Quiz
•
5th Grade - Professio...
14 questions
10.2 Cybersecurity

Quiz
•
9th - 12th Grade
10 questions
DATA, INFORMATION AND KNOWLEDGE

Quiz
•
6th - 11th Grade
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade