Y9 Hwk Quiz 1 (Social Engineering)

Y9 Hwk Quiz 1 (Social Engineering)

9th Grade

15 Qs

quiz-placeholder

Similar activities

IT (data, viruses and more)

IT (data, viruses and more)

8th Grade - Professional Development

20 Qs

ICT 9 Quiz 1

ICT 9 Quiz 1

9th Grade

10 Qs

ZOOM QUIZ

ZOOM QUIZ

1st - 12th Grade

10 Qs

Uji Pengetahuan Jaringan Komputer

Uji Pengetahuan Jaringan Komputer

9th Grade

20 Qs

7.02 going online

7.02 going online

4th - 9th Grade

10 Qs

Input, output and storage de

Input, output and storage de

8th Grade - Professional Development

14 Qs

9G4 CS Python Programming Sequence and Vocabs

9G4 CS Python Programming Sequence and Vocabs

9th Grade

13 Qs

PTS TIK Kelas 9 Semester Ganjil

PTS TIK Kelas 9 Semester Ganjil

9th Grade

20 Qs

Y9 Hwk Quiz 1 (Social Engineering)

Y9 Hwk Quiz 1 (Social Engineering)

Assessment

Quiz

Computers

9th Grade

Practice Problem

Hard

Created by

Mr Renshaw

Used 35+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

The email above may be what type of attack?

Shouldering

Phishing

Blagging

Hacking

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

‘A set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes’ is a definition of which of the following key terms?

Shouldering

Phishing

Blagging

Social Engineering

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is when attackers create short, fun quizzes in an attempt to find out key pieces of information that can help them answer account security questions?

Blagging

Shouldering

Name generator attack

Phishing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Shouldering is...

the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.

the attacker watching the victim while they provide sensitive information

he victim is asked in an app or a social media post to combine a few pieces of information or complete a short quiz to produce a name.

the perpetrator invents a scenario in order to convince the victim to give them data or money.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

phishing is...

the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.

the attacker watching the victim while they provide sensitive information

he victim is asked in an app or a social media post to combine a few pieces of information or complete a short quiz to produce a name.

the perpetrator invents a scenario in order to convince the victim to give them data or money.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

name generator attacks are...

the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.

the attacker watching the victim while they provide sensitive information

he victim is asked in an app or a social media post to combine a few pieces of information or complete a short quiz to produce a name.

the perpetrator invents a scenario in order to convince the victim to give them data or money.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

blagging is...

the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.

the attacker watching the victim while they provide sensitive information

he victim is asked in an app or a social media post to combine a few pieces of information or complete a short quiz to produce a name.

the perpetrator invents a scenario in order to convince the victim to give them data or money.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?