Y9 Hwk Quiz 1 (Social Engineering)

Y9 Hwk Quiz 1 (Social Engineering)

9th Grade

15 Qs

quiz-placeholder

Similar activities

SLR 4 - Cyber Security Threats - part 1

SLR 4 - Cyber Security Threats - part 1

9th - 11th Grade

10 Qs

Cyber security quizlet

Cyber security quizlet

8th - 9th Grade

10 Qs

1.4 - Network Attacks

1.4 - Network Attacks

7th - 12th Grade

14 Qs

Online Safety: CyberSecurity

Online Safety: CyberSecurity

6th - 12th Grade

16 Qs

Cyber Security KS4

Cyber Security KS4

8th - 12th Grade

15 Qs

Cybersecurity

Cybersecurity

9th - 12th Grade

20 Qs

Social Engineering Attacks

Social Engineering Attacks

9th - 12th Grade

17 Qs

AQA GCSE Computer Science - 3.6.1.1 Pharming & Shouldering

AQA GCSE Computer Science - 3.6.1.1 Pharming & Shouldering

8th - 10th Grade

10 Qs

Y9 Hwk Quiz 1 (Social Engineering)

Y9 Hwk Quiz 1 (Social Engineering)

Assessment

Quiz

Computers

9th Grade

Hard

Created by

Mr Renshaw

Used 29+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

The email above may be what type of attack?

Shouldering

Phishing

Blagging

Hacking

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

‘A set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes’ is a definition of which of the following key terms?

Shouldering

Phishing

Blagging

Social Engineering

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is when attackers create short, fun quizzes in an attempt to find out key pieces of information that can help them answer account security questions?

Blagging

Shouldering

Name generator attack

Phishing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Shouldering is...

the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.

the attacker watching the victim while they provide sensitive information

he victim is asked in an app or a social media post to combine a few pieces of information or complete a short quiz to produce a name.

the perpetrator invents a scenario in order to convince the victim to give them data or money.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

phishing is...

the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.

the attacker watching the victim while they provide sensitive information

he victim is asked in an app or a social media post to combine a few pieces of information or complete a short quiz to produce a name.

the perpetrator invents a scenario in order to convince the victim to give them data or money.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

name generator attacks are...

the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.

the attacker watching the victim while they provide sensitive information

he victim is asked in an app or a social media post to combine a few pieces of information or complete a short quiz to produce a name.

the perpetrator invents a scenario in order to convince the victim to give them data or money.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

blagging is...

the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.

the attacker watching the victim while they provide sensitive information

he victim is asked in an app or a social media post to combine a few pieces of information or complete a short quiz to produce a name.

the perpetrator invents a scenario in order to convince the victim to give them data or money.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?