Unit 3: Social Engineering

Unit 3: Social Engineering

9th - 12th Grade

24 Qs

quiz-placeholder

Similar activities

SQA - Data Security

SQA - Data Security

9th Grade

20 Qs

(L2) 1.4 Network Security

(L2) 1.4 Network Security

10th Grade

19 Qs

History of Computers & Internet Quiz

History of Computers & Internet Quiz

9th - 12th Grade

20 Qs

CYBER SAFETY

CYBER SAFETY

9th Grade

20 Qs

G10 IGCSE ICT Security of Data

G10 IGCSE ICT Security of Data

9th - 10th Grade

20 Qs

Computer Crimes and Computer Ethics

Computer Crimes and Computer Ethics

6th - 10th Grade

21 Qs

Networking

Networking

9th - 11th Grade

21 Qs

Privacy and security

Privacy and security

7th - 9th Grade

20 Qs

Unit 3: Social Engineering

Unit 3: Social Engineering

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

Devante Williams

Used 1+ times

FREE Resource

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Media Image

This email is what type of attack?

Shoulder surfing

Dumpster Diving

Phishing

Hacking

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Media Image

What is the key indication that the email is the type of attack that you gave as your answer in question 1?

Somebody watches you create an account

Suspicious URL

It asks for you to complete a short quiz

It is an invented scenario

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A set of methods used by cyber criminals to deceive individuals into handing over information that they can use for fraudulent purposes’ is a definition of what?

Blagging

Shouldering

Phishing

Social Engineering

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What would be a key indicator of a phishing email?

a new email from a friend arranging a meet

unexpected email with request for information

work email from a client with personal attachments

a email from family with a picture

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is one way somebody could protect themselves from shoulder surfing?

share your pin with someone you trust

create a pin that is easy to remember

have a pin that is the same as your friends

be aware of who is around you

6.

FILL IN THE BLANK QUESTION

2 mins • 1 pt

..........................................arguably creates the largest risk of the data being compromised.

7.

MULTIPLE CHOICE QUESTION

2 mins • Ungraded

Which is the worst form of data a hacker could use to perform identity theft?

Name

Address

School Name

Age

Town/City you Live in

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?