Social engineering-1-G8

Social engineering-1-G8

8th Grade

9 Qs

quiz-placeholder

Similar activities

Google Workspace

Google Workspace

3rd - 8th Grade

13 Qs

CPU

CPU

6th - 8th Grade

10 Qs

CYBER THREATS

CYBER THREATS

7th - 9th Grade

8 Qs

The CPU

The CPU

KG - University

11 Qs

Revision of CPU

Revision of CPU

KG - Professional Development

12 Qs

Von Neumann

Von Neumann

1st - 9th Grade

10 Qs

KS3 Memory and Storage

KS3 Memory and Storage

7th - 8th Grade

10 Qs

Brute force

Brute force

8th Grade

10 Qs

Social engineering-1-G8

Social engineering-1-G8

Assessment

Quiz

Computers

8th Grade

Hard

Created by

Rasha Ali

Used 3+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

"Your computer may be affected with severe malware".

This message is a common example of a

social engineering attack

antivirus problem

normal message

2.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

..............................is a technique that influences users of a computing system into disclosing confidential information.

Social engineering

network

technology

social media

3.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Scamsters and cybercriminals use social engineering attacks to look for people’s personal information.

True

False

4.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Once scamsters and cybercriminals have people’s personal information, they may install malicious malware on the victims’ computers and trick them into giving their bank information or passwords.

true

false

5.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

The attacker learns as much as he can about the

targeted victim. Data is collected from company

websites also by talking to the users of the target

system.

Plot attack

Fetch tools

Collect data

attack

6.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

The attackers plan how to execute the attack.

Collect data

Plot attack

Fetch tools

attack

7.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

The attackers procure software programs that would be

used during the attack

Collect data

Plot attack

attack

Fetch tools

8.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

The attackers find the weaknesses in the victims

system.

collect data

plot attack

attack

fetch tools

9.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Data collected duri ngthe social engineering strategy

such as emails. anniversaries. birth dates. and so on. is

used in attacks targeting password identification.

attack

use gained knowledge

collect data

fetch tools