Unit 3: Social Engineering

Unit 3: Social Engineering

9th - 12th Grade

•

24 Qs

quiz-placeholder

Similar activities

Computer Fundamentals

Computer Fundamentals

10th Grade

•

20 Qs

JAVA method

JAVA method

12th Grade

•

21 Qs

Web Dev Diagnostic

Web Dev Diagnostic

7th - 10th Grade

•

20 Qs

Icon challenge

Icon challenge

4th - 9th Grade

•

26 Qs

Text and Image representation

Text and Image representation

11th Grade

•

22 Qs

IT (data, viruses and more)

IT (data, viruses and more)

8th Grade - Professional Development

•

20 Qs

Practice Quiz for Term 1

Practice Quiz for Term 1

10th Grade

•

20 Qs

ICT WEBINAR QUIZ

ICT WEBINAR QUIZ

KG - Professional Development

•

20 Qs

Unit 3: Social Engineering

Unit 3: Social Engineering

Assessment

Quiz

•

Computers

•

9th - 12th Grade

•

Easy

Created by

Devante Williams

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Media Image

This email is what type of attack?

Shoulder surfing

Dumpster Diving

Phishing

Hacking

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Media Image

What is the key indication that the email is the type of attack that you gave as your answer in question 1?

Somebody watches you create an account

Suspicious URL

It asks for you to complete a short quiz

It is an invented scenario

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A set of methods used by cyber criminals to deceive individuals into handing over information that they can use for fraudulent purposes’ is a definition of what?

Blagging

Shouldering

Phishing

Social Engineering

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What would be a key indicator of a phishing email?

a new email from a friend arranging a meet

unexpected email with request for information

work email from a client with personal attachments

a email from family with a picture

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is one way somebody could protect themselves from shoulder surfing?

share your pin with someone you trust

create a pin that is easy to remember

have a pin that is the same as your friends

be aware of who is around you

6.

FILL IN THE BLANK QUESTION

2 mins • 1 pt

..........................................arguably creates the largest risk of the data being compromised.

7.

MULTIPLE CHOICE QUESTION

2 mins • Ungraded

Which is the worst form of data a hacker could use to perform identity theft?

Name

Address

School Name

Age

Town/City you Live in

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?