Cybersecurity: Session 3

Cybersecurity: Session 3

Professional Development

6 Qs

quiz-placeholder

Similar activities

Logical Instability Case

Logical Instability Case

Professional Development

9 Qs

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

HTTP responses & request methods

HTTP responses & request methods

Professional Development

10 Qs

Quiz de Engenharia Eletrônica

Quiz de Engenharia Eletrônica

Professional Development

10 Qs

AI’s New Job That Pays Up to $250K a Year Quizizz

AI’s New Job That Pays Up to $250K a Year Quizizz

Professional Development

10 Qs

FinTech 05-1 APIs

FinTech 05-1 APIs

Professional Development

11 Qs

Cybersecurity Concepts

Cybersecurity Concepts

Professional Development

10 Qs

Topic 2 : Exam Pool B

Topic 2 : Exam Pool B

Professional Development

5 Qs

Cybersecurity: Session 3

Cybersecurity: Session 3

Assessment

Quiz

Computers

Professional Development

Easy

Created by

Camille Lau

Used 1+ times

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Social Engineering is ______________?

simply the art of getting unsuspecting persons to reveal sensitive information about a system

simply the act of getting closer to someone who is studying Engineering

simply the community for people to develop relationship with each other

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"An attacker who impersonates an external IT services auditor and manipulates a company’s physical security staff into letting them into the building"

Which of the following is the social engineering attack of this example?

Baiting

Pretexting

Phishing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following human behavior is NOT social engineering will exploit?

Greedy

Prurience

Patient

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the meaning of Tailgating?

an attacker quickly follows an authorized person into a secure location

an attacker quickly stole the ID of victim in a nearly place

an attacker quickly hacks into the victim's computer when nobody at home

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Baiting is like the real-world ____________ that uses physical media and relies on the curiosity or greed of the victim

Please choose a suitable word to fill in the blank.

backdoor

Worms

Trojan horse

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When attacker request for "Something for something", that means ______________________________________?

Choose an option to fit the sentence.

an attacker requests personal information from a party in exchange for something

an attacker requests valuable property from someone to in exchange for something

an attacker requests high amount of money in exchange for something