
GCSE Digital Technology 1.5 Social Engineering
Authored by daniel spear
Computers
8th Grade
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which fraudulent technique involves a user who is tricked (an email message is common) into revealing personal or confidential information?
Dumpster diving
Scareware
Phishing
Shoulder-surfing
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which form of visual hacking, refers to the act of obtaining personal or private information through direct observation?
Dumpster diving
Scareware
Phishing
Shoulder-surfing
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which malicious computer program is designed to trick a user into buying and downloading unnecessary and potentially dangerous software, such as fake antivirus protection?
Dumpster diving
Scareware
Phishing
Shoulder-surfing
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which technique is used to go through the bins inside and outside of buildings to find confidential information?
Dumpster diving
Scareware
Phishing
Shoulder-surfing
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which sort of social engineering attack is likely to occur at a cashpoint (ATM)?
Dumpster diving
Scareware
Phishing
Shoulder-surfing
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which social engineering technique involves someone inventing a scenario in order to trick the user to pass on personal/sensitive data?
Scareware
Blagging
Shoulder - surfing
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What tool is used to remove unwanted emails from your inbox?
Spam filter
Spam cipher
Spambox
Trash
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?