Social Engineering

Social Engineering

8th Grade - Professional Development

8 Qs

quiz-placeholder

Similar activities

Quiz 8 (01.09.2021)

Quiz 8 (01.09.2021)

1st - 12th Grade

10 Qs

4 การใช้เทคโนโลยีสารสนเทศอย่างปลอดภัย และนำผลงานมาใช้ ม.3

4 การใช้เทคโนโลยีสารสนเทศอย่างปลอดภัย และนำผลงานมาใช้ ม.3

9th Grade

10 Qs

Software-Chapter 6

Software-Chapter 6

7th - 10th Grade

10 Qs

Creative Tech 2 - Recitation 1

Creative Tech 2 - Recitation 1

8th Grade

10 Qs

Networking_Terminology_1

Networking_Terminology_1

8th - 12th Grade

10 Qs

ICT as Platform for Change

ICT as Platform for Change

11th - 12th Grade

10 Qs

Numpy-1

Numpy-1

9th - 12th Grade

10 Qs

Contact Center Sevices

Contact Center Sevices

7th - 10th Grade

10 Qs

Social Engineering

Social Engineering

Assessment

Quiz

Computers

8th Grade - Professional Development

Medium

Created by

Elena S

Used 17+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

Attack that uses human interactions (social skills) to obtain info about an organization and computer systmes

Attack that floods a network and servers with traffic to overload resources and bandwidth

Attack where a hacker inserts malicious code into a website to force it to return protected info

Attack that uses emails to ask form personal info by posing as a trustworthy organization

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Media Image

Select all options that indicate an email is fake

The email has attachments on it that ask you to download

The email comes from a school email address that matches what the directory lists when you look it up separately

The email has poor grammar and many misspellings

The email has a receipt of payment that asks you for more of your credentials

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is spear phishing

attacks that are carried out over the phone

attacks that are targeted at a specific company or individual

attacks that occur over text messaging

attacks that capture user info through a fake login page

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

True or False: Cybersecurity is a balance between security and convenience

True

False

5.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Which is NOT an example of social engineering?

An individual is carrying heavy boxes and cannot get their keys out or open the door to an office. They notice you passing by and ask you if you can help them and let them into the room. 

An individual runs a program called Jack the Ripper to try and find out the password to your UAH single sign on account.

An individual calls you on the phone and requests information about an employee record. They tell you that they are part of the IT department and need this information to determine whether to close the account or not.

You meet a new employee at the beginning of the semester while you're at the cafeteria. You have a good conversation with this person and find out that you both have dogs. A few days later you encounter the same person again, and they begin to ask you about the Dean, if she owns any pets, as well. 

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Shouldering surfing...

...means looking over someone's shoulder to see personal information

...means framing as someone else to gain personal information

...means using pop-up adverts to redirect users

...means using threats to gain personal information

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of these are examples of phishing?

Media Image
Media Image
Media Image
Media Image

8.

OPEN ENDED QUESTION

3 mins • 1 pt

Did you know what social engineering was before this training?

Evaluate responses using AI:

OFF