Search Header Logo

Y11 Social engineering

Authored by Gyorgy Denes

Computers

11th Grade

Used 34+ times

Y11 Social engineering
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is the best definition of Phishing?

Calling someone to create an invented situation that increases the chance they will share sensitive information with you.

Sending an email that pretends to be from a reputable company which usually has a link to click that takes you to a website that looks real but is not.

A cyber attack that offers some a service or product that might be of benefit to the user. Once accepted, the attacker might ask for access to the user's system, or they might ask for anti-malware to be turned off.

A cyber attack exploiting the user's curiosity or greed. The victim might be offered free music or an app upgrade.,

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is the best definition of Blagging?

Calling someone to create an invented situation that increases the chance they will share sensitive information with you.

Sending an email that pretends to be from a reputable company which usually has a link to click that takes you to a website that looks real but is not.

A cyber attack that offers some a service or product that might be of benefit to the user. Once accepted, the attacker might ask for access to the user's system, or they might ask for anti-malware to be turned off.

A cyber attack exploiting the user's curiosity or greed. The victim might be offered free music or an app upgrade.,

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most likely to be the weakest point in a security system?

firewall

encryption

backup storage

the user

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is the best definition of Baiting?

Calling someone to create an invented situation that increases the chance they will share sensitive information with you.

Sending an email that pretends to be from a reputable company which usually has a link to click that takes you to a website that looks real but is not.

A cyber attack that offers some a service or product that might be of benefit to the user. Once accepted, the attacker might ask for access to the user's system, or they might ask for anti-malware to be turned off.

A cyber attack exploiting the user's curiosity or greed. The victim might be offered free music or an app upgrade.,

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is the best definition of Quid pro quo?

Calling someone to create an invented situation that increases the chance they will share sensitive information with you.

Sending an email that pretends to be from a reputable company which usually has a link to click that takes you to a website that looks real but is not.

A cyber attack that offers some a service or product that might be of benefit to the user. Once accepted, the attacker might ask for access to the user's system, or they might ask for anti-malware to be turned off.

A cyber attack exploiting the user's curiosity or greed. The victim might be offered free music or an app upgrade.,

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Social engineering is ...

the science of creating societies

an umbrella term describing all cyberattacks

an umbrella term describing cyberattacks committed by humans

an umbrella term describing cyberattacks exploiting human behaviour.

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Phishing can happen over

email

phone calls

instant messaging

fake websites

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?