Search Header Logo

Securing Data & Systems WJEC GCSE CBAC

Authored by Stewart Roberts

Computers

10th Grade

Used 3+ times

Securing Data & Systems WJEC GCSE CBAC
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is meant by social engineering?

When cyber criminals take advantage of human behaviours without the

use of code to gain unauthorised access to sensitive data.

When cyber criminals take advantage of poor security to use basic code to gain unauthorised access to sensitive data.

When cyber criminals engineer the code to gain unauthorised access to sensitive data.

When cyber criminals take advantage of poor security to use advanced coding techniques to gain unauthorised access to sensitive data.

2.

REORDER QUESTION

1 min • 1 pt

Reorder the following to show the life cycle of a social engineering attack

Interact with the victim

Execute the attack

remove all traces of the attack

Identify the victim

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What type of social engineering attack is this?

Phishing

Trojan

Denial of service

Scareware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

A fraudulent technique where an internet user is tricked (an email

message is common) into revealing personal or confidential

information

A method of forcing users into denial of service therefore revealing login details

A type of wide scale attack that searches for login details in email inboxes

A fraudulent technique where an internet user is tricked using a coded script into revealing personal or confidential

information.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of language would you expect to see in a phishing email?

Pressuring, urgent demanding

Suggestive, polite, friendly

Formal, non urgent professional

Kind, helpful, endearing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Phishing emails are normally addressed dear sir/madam and are not personal

TRUE

FALSE

7.

MATCH QUESTION

1 min • 1 pt

Match the following Social engineering attack methods

Scareware

A fraudulent technique

where an internet user is

tricked (an email message is

common) into revealing

personal or confidential

information.

Shoulder Surfing

This is when a criminal will

make up a scenario in order

to extract sensitive

information. This could be

done via email, over the

phone or even in person.

Blagging

This method refers to the act of obtaining

personal or private

information through direct

observation.

Baiting

Malicious computer

programs designed to trick a

user into buying and

downloading unnecessary

and potentially dangerous

software, such as fake

antivirus protection.

Phishing

Attacks of this method use a false

promise to pique a victim's

greed or curiosity. They

lure users into a trap that

steals their personal

information or inflicts their

systems with malware.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?