
Social engineering 1
Authored by O Hawkridge
Computers
10th Grade
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
14 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
Which of the following are social engineering techniques (PICK 3)?
Blagging
Hacking
Phishing
Shoulder surfing
Malware
Answer explanation
Hacking is a way of gaining unauthorised access to another person's computer or device.
2.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
2 common things phishing email have are....
Spelling mistakes
Images
Links they want you to click
Good grammar
Answer explanation
The most obvious signs of a phishing email are spelling mistakes and links. Not all emails with links are suspicious, but always check the website address before entering any personal information.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How are people targeted through phishing?
via email
on websites
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of these are warning signs of a phishing email?
Incorrect "from" address
Pressure to rush
Suspicious links
All of them
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Social Engineering takes advantage of what a computer system?
The user
The network
The password
The hardware
6.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Which techniques can be seen in this email (PICK 3)?
Social Pressure - Legal Authority
Financial Pressure
Threat
Blackmail
7.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
....... is the art of manipulating people so they give up confidential information.
Blagging
Social engineering
Pharming
Phishing
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?