
Homework Quiz (Social Engineering)
Authored by Ahmed Patel
Computers
9th Grade
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The email above may be what type of attack?
Shouldering
Phishing
Blagging
Hacking
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
‘A set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes’ is a definition of which of the following key terms?
Shouldering
Phishing
Blagging
Social Engineering
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is when attackers create short, fun quizzes in an attempt to find out key pieces of information that can help them answer account security questions?
Blagging
Shouldering
Name generator attack
Phishing
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Shouldering is...
the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.
the attacker watching the victim while they provide sensitive information
he victim is asked in an app or a social media post to combine a few pieces of information or complete a short quiz to produce a name.
the perpetrator invents a scenario in order to convince the victim to give them data or money.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
phishing is...
the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.
the attacker watching the victim while they provide sensitive information
he victim is asked in an app or a social media post to combine a few pieces of information or complete a short quiz to produce a name.
the perpetrator invents a scenario in order to convince the victim to give them data or money.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
name generator attacks are...
the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.
the attacker watching the victim while they provide sensitive information
he victim is asked in an app or a social media post to combine a few pieces of information or complete a short quiz to produce a name.
the perpetrator invents a scenario in order to convince the victim to give them data or money.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
blagging is...
the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.
the attacker watching the victim while they provide sensitive information
he victim is asked in an app or a social media post to combine a few pieces of information or complete a short quiz to produce a name.
the perpetrator invents a scenario in order to convince the victim to give them data or money.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?