Social Engineering - CyberSecurity

Social Engineering - CyberSecurity

9th - 12th Grade

8 Qs

quiz-placeholder

Similar activities

ICT - Networks and communication

ICT - Networks and communication

9th Grade

11 Qs

LET's Check your knowledge on E-Governance & E-Commerce

LET's Check your knowledge on E-Governance & E-Commerce

10th Grade

11 Qs

Pandas - CSV file

Pandas - CSV file

12th Grade

10 Qs

ICT TANJORE

ICT TANJORE

12th Grade

11 Qs

Microsoft word

Microsoft word

11th Grade

10 Qs

Cell Phone Vocabulary

Cell Phone Vocabulary

9th - 12th Grade

12 Qs

HARDWARE AND SOFTWARE

HARDWARE AND SOFTWARE

2nd - 10th Grade

10 Qs

Q1 M 2 - TOPIC 2 / Check your understanding

Q1 M 2 - TOPIC 2 / Check your understanding

10th Grade

10 Qs

Social Engineering - CyberSecurity

Social Engineering - CyberSecurity

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Hard

Created by

H Valli

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most accurate definition of Shoulder

The ability to hack someones account by coding

When people physically look over someones shoulder

When people virtually look over someones shoulder

A combination of both physical and virtual method to look over someoners shoulder

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of therse is NOT a Social engineering attack

Phishing

Blagging

Shouldering

DDOS

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Blagging

Convincing 1000's of people to send details or money to you

Convincing a couple people when they respond to ONLY a phishing attack

Convincing a couple people when they respond to any attack

none of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What type of social engineering attack is this?

Phishing

Hacking

Shouldering

Blagging

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main aim of any cyberattack?

To gain data

To get money

To have fun

None of the above

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes’ is a definition of which of the following key terms?

Shouldering

Phishing

Blagging

Social Engineering

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is when attackers create short, fun quizzes in an attempt to find out key pieces of information that can help them answer account security questions?

Shouldering

Name Generator Attack

Phishing

Blagging

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following are key indicators of a phishing attack?

The email address looks odd

There is a suspicious hyperlink

Spelling Errors

All of the above