Search Header Logo

Social Engineering

Authored by Ryan Age

Professional Development

Professional Development

10 Questions

Used 23+ times

Social Engineering
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following best defines a social engineer?

Someone who spends a lot of time in public places.

Someone who leverages psychological manipulation to hack humans.

Someone who breaks into networks with sophisticated hacking tools.

Someone who designs malicious software to phish people.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You receive a text message from your bank stating that your account has been locked due to fraudulent activity, and to unlock it you need to click a link and log in.


What should you do next?

Delete the message and call your bank directly to confirm.

Forward the text to a friend and see if they think it's suspicious.

Click the link so you can fix your account.

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Why should you never plug a random USB drive into your computer?

Because it could contain malware or viruses.

Because it could have been left for you to find it intentionally.

Because it might violate our organization's policies.

All of the above.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Someone from the IT department calls you and states that he needs your username and password so the can run an update on your computer. How should you handle this situation?

Promptly end the phone call and report the incident to management.

Tell him you'll email your username and password to the IT department because that's a safer form of communication.

Give him your username and password since updates are a crucial part of security.

Put him on hold and ask your co-worker if their computer has been updated.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following statements is true?

Emails that request sensitive information of any sort should be treated with skepticism.

Emails from your boss and other co-workers can always be trusted.

Emails with spammy content are harmless.

Emails containing attachments are usually malicious.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Your manager is attending a meeting that is out of town. You receive a text message from her late at night indicating she lost her purse and asking you to urgently send her some funds until she can get to the bank in the morning. Which of the following is the biggest red flag in this scenario?

Your manager urgently needs you to send her money.

Your manager has to go to the bank in the morning.

Your manager is sending you a message late at night.

Your manager is attending a meeting that is out of town.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

You receive a call from “Credit Services.” The person on the line compliments you on your great credit history and also informs you that you have qualified for a card with better features and a lower rate. They’ll only need a few minutes of your time to go over some personal information before they can get the card out to you. Which of the following is the biggest red flag in this scenario?

You'll have to provide personal information.

They'll only need a few minutes of your time.

You have qualified for a credit card.

You received a call from "Credit Services."

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?