Y11 Social engineering

Y11 Social engineering

11th Grade

11 Qs

quiz-placeholder

Similar activities

DETECTING AND PREVENTING CYBER SECURITY THREATS

DETECTING AND PREVENTING CYBER SECURITY THREATS

9th - 12th Grade

15 Qs

Malware

Malware

7th - 11th Grade

15 Qs

J277 1.4 Network Security Quiz (Forms of Attack)

J277 1.4 Network Security Quiz (Forms of Attack)

9th - 12th Grade

13 Qs

J277 Operating Systems

J277 Operating Systems

10th - 12th Grade

15 Qs

Threat Modeling

Threat Modeling

9th - 12th Grade

10 Qs

Welcome to Cyber Security

Welcome to Cyber Security

7th - 12th Grade

10 Qs

Unit 1.4 Systems Software MCQs 1

Unit 1.4 Systems Software MCQs 1

7th - 11th Grade

11 Qs

Y11 Social engineering

Y11 Social engineering

Assessment

Quiz

Computers

11th Grade

Medium

Created by

Gyorgy Denes

Used 34+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is the best definition of Phishing?

Calling someone to create an invented situation that increases the chance they will share sensitive information with you.

Sending an email that pretends to be from a reputable company which usually has a link to click that takes you to a website that looks real but is not.

A cyber attack that offers some a service or product that might be of benefit to the user. Once accepted, the attacker might ask for access to the user's system, or they might ask for anti-malware to be turned off.

A cyber attack exploiting the user's curiosity or greed. The victim might be offered free music or an app upgrade.,

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is the best definition of Blagging?

Calling someone to create an invented situation that increases the chance they will share sensitive information with you.

Sending an email that pretends to be from a reputable company which usually has a link to click that takes you to a website that looks real but is not.

A cyber attack that offers some a service or product that might be of benefit to the user. Once accepted, the attacker might ask for access to the user's system, or they might ask for anti-malware to be turned off.

A cyber attack exploiting the user's curiosity or greed. The victim might be offered free music or an app upgrade.,

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most likely to be the weakest point in a security system?

firewall

encryption

backup storage

the user

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is the best definition of Baiting?

Calling someone to create an invented situation that increases the chance they will share sensitive information with you.

Sending an email that pretends to be from a reputable company which usually has a link to click that takes you to a website that looks real but is not.

A cyber attack that offers some a service or product that might be of benefit to the user. Once accepted, the attacker might ask for access to the user's system, or they might ask for anti-malware to be turned off.

A cyber attack exploiting the user's curiosity or greed. The victim might be offered free music or an app upgrade.,

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is the best definition of Quid pro quo?

Calling someone to create an invented situation that increases the chance they will share sensitive information with you.

Sending an email that pretends to be from a reputable company which usually has a link to click that takes you to a website that looks real but is not.

A cyber attack that offers some a service or product that might be of benefit to the user. Once accepted, the attacker might ask for access to the user's system, or they might ask for anti-malware to be turned off.

A cyber attack exploiting the user's curiosity or greed. The victim might be offered free music or an app upgrade.,

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Social engineering is ...

the science of creating societies

an umbrella term describing all cyberattacks

an umbrella term describing cyberattacks committed by humans

an umbrella term describing cyberattacks exploiting human behaviour.

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Phishing can happen over

email

phone calls

instant messaging

fake websites

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?