
Principles of Social Engineering
Authored by Robert Simmons
Computers
10th - 12th Grade
Used 29+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the follow is a principle of social engineering that involves an attacker taking on the role of a CEO or an agent from the FBI to coerce a victim to complete a task?
Reciprocity
Liking
Scarcity
Authority
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the follow is a principle of social engineering that involves an attacker pressuring a victim to act due to a limited time offer or supply?
Reciprocity
Liking
Scarcity
Authority
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can social engineering attacks can be accomplished?
Face to Face
Online
Both A and B
Neither A nor B
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the follow is a principle of social engineering that involves an attacker threatening a victim if they do not comply with demands?
Intimidation
Liking
Reciprocity
Authority
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the follow is a principle of social engineering that involves an attacker convincing a victim that a particular action is routine?
Consensus
Liking
Scarcity
Authority
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which social engineering principle is in use when an attacker pretends to know friends of a victim?
Reciprocity
Familiarity
Scarcity
Authority
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which social engineering principle is in use when an attacker calls you, claiming to be from the IRS?
Reciprocity
Liking
Scarcity
Authority
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?