Search Header Logo

Homework Quiz (Social Engineering)

Authored by Ahmed Patel

Computers

9th Grade

Used 4+ times

Homework Quiz (Social Engineering)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

The email above may be what type of attack?

Shouldering

Phishing

Blagging

Hacking

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

‘A set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes’ is a definition of which of the following key terms?

Shouldering

Phishing

Blagging

Social Engineering

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is when attackers create short, fun quizzes in an attempt to find out key pieces of information that can help them answer account security questions?

Blagging

Shouldering

Name generator attack

Phishing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Shouldering is...

the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.

the attacker watching the victim while they provide sensitive information

he victim is asked in an app or a social media post to combine a few pieces of information or complete a short quiz to produce a name.

the perpetrator invents a scenario in order to convince the victim to give them data or money.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

phishing is...

the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.

the attacker watching the victim while they provide sensitive information

he victim is asked in an app or a social media post to combine a few pieces of information or complete a short quiz to produce a name.

the perpetrator invents a scenario in order to convince the victim to give them data or money.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

name generator attacks are...

the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.

the attacker watching the victim while they provide sensitive information

he victim is asked in an app or a social media post to combine a few pieces of information or complete a short quiz to produce a name.

the perpetrator invents a scenario in order to convince the victim to give them data or money.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

blagging is...

the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.

the attacker watching the victim while they provide sensitive information

he victim is asked in an app or a social media post to combine a few pieces of information or complete a short quiz to produce a name.

the perpetrator invents a scenario in order to convince the victim to give them data or money.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?