Cybersecurity: Session 3

Cybersecurity: Session 3

Professional Development

6 Qs

quiz-placeholder

Similar activities

Cyber Security Quiz

Cyber Security Quiz

Professional Development

10 Qs

Domain 1 Quizizz Game (Social Engineering Techniques)

Domain 1 Quizizz Game (Social Engineering Techniques)

Professional Development

11 Qs

Social Engineering Quiz

Social Engineering Quiz

Professional Development

10 Qs

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

CEH Pre Assessment

CEH Pre Assessment

Professional Development

10 Qs

Network Attack Indicators

Network Attack Indicators

Professional Development

10 Qs

Scanning Networks

Scanning Networks

Professional Development

10 Qs

SLO & SLI

SLO & SLI

Professional Development

10 Qs

Cybersecurity: Session 3

Cybersecurity: Session 3

Assessment

Quiz

Computers

Professional Development

Easy

Created by

Camille Lau

Used 1+ times

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Social Engineering is ______________?

simply the art of getting unsuspecting persons to reveal sensitive information about a system

simply the act of getting closer to someone who is studying Engineering

simply the community for people to develop relationship with each other

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"An attacker who impersonates an external IT services auditor and manipulates a company’s physical security staff into letting them into the building"

Which of the following is the social engineering attack of this example?

Baiting

Pretexting

Phishing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following human behavior is NOT social engineering will exploit?

Greedy

Prurience

Patient

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the meaning of Tailgating?

an attacker quickly follows an authorized person into a secure location

an attacker quickly stole the ID of victim in a nearly place

an attacker quickly hacks into the victim's computer when nobody at home

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Baiting is like the real-world ____________ that uses physical media and relies on the curiosity or greed of the victim

Please choose a suitable word to fill in the blank.

backdoor

Worms

Trojan horse

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When attacker request for "Something for something", that means ______________________________________?

Choose an option to fit the sentence.

an attacker requests personal information from a party in exchange for something

an attacker requests valuable property from someone to in exchange for something

an attacker requests high amount of money in exchange for something