
Securing Data & Systems WJEC GCSE CBAC

Quiz
•
Computers
•
10th Grade
•
Medium

Stewart Roberts
Used 3+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is meant by social engineering?
When cyber criminals take advantage of human behaviours without the
use of code to gain unauthorised access to sensitive data.
When cyber criminals take advantage of poor security to use basic code to gain unauthorised access to sensitive data.
When cyber criminals engineer the code to gain unauthorised access to sensitive data.
When cyber criminals take advantage of poor security to use advanced coding techniques to gain unauthorised access to sensitive data.
2.
REORDER QUESTION
1 min • 1 pt
Reorder the following to show the life cycle of a social engineering attack
remove all traces of the attack
Execute the attack
Identify the victim
Interact with the victim
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of social engineering attack is this?
Phishing
Trojan
Denial of service
Scareware
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is phishing?
A fraudulent technique where an internet user is tricked (an email
message is common) into revealing personal or confidential
information
A method of forcing users into denial of service therefore revealing login details
A type of wide scale attack that searches for login details in email inboxes
A fraudulent technique where an internet user is tricked using a coded script into revealing personal or confidential
information.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of language would you expect to see in a phishing email?
Pressuring, urgent demanding
Suggestive, polite, friendly
Formal, non urgent professional
Kind, helpful, endearing
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Phishing emails are normally addressed dear sir/madam and are not personal
TRUE
FALSE
7.
MATCH QUESTION
1 min • 1 pt
Match the following Social engineering attack methods
Shoulder Surfing
Attacks of this method use a false
promise to pique a victim's
greed or curiosity. They
lure users into a trap that
steals their personal
information or inflicts their
systems with malware.
Baiting
This method refers to the act of obtaining
personal or private
information through direct
observation.
Phishing
A fraudulent technique
where an internet user is
tricked (an email message is
common) into revealing
personal or confidential
information.
Blagging
This is when a criminal will
make up a scenario in order
to extract sensitive
information. This could be
done via email, over the
phone or even in person.
Scareware
Malicious computer
programs designed to trick a
user into buying and
downloading unnecessary
and potentially dangerous
software, such as fake
antivirus protection.
Create a free account and access millions of resources
Similar Resources on Wayground
25 questions
Modern Technologies

Quiz
•
10th - 11th Grade
15 questions
IT Security & Encryption of Data

Quiz
•
8th - 10th Grade
15 questions
BTEC IT Unit 1 - D1 Threats to data

Quiz
•
10th - 12th Grade
16 questions
Computer Science 1.6

Quiz
•
10th Grade
18 questions
Forms of Network Attack

Quiz
•
10th Grade
20 questions
OCR J276 1.2 Memory

Quiz
•
10th - 11th Grade
18 questions
Y10 Mock - 2022

Quiz
•
10th Grade
16 questions
Year 7 - CPU, RAM, ROM

Quiz
•
7th - 11th Grade
Popular Resources on Wayground
12 questions
Unit Zero lesson 2 cafeteria

Lesson
•
9th - 12th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
20 questions
Lab Safety and Equipment

Quiz
•
8th Grade
13 questions
25-26 Behavior Expectations Matrix

Quiz
•
9th - 12th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade