Social Engineering

Social Engineering

10th Grade

11 Qs

quiz-placeholder

Similar activities

ESBWB Workbook Domain 1 Lesson 2

ESBWB Workbook Domain 1 Lesson 2

9th - 12th Grade

15 Qs

Do You Know Your Keyboard?

Do You Know Your Keyboard?

5th - 10th Grade

15 Qs

Cyber Security KS4

Cyber Security KS4

8th - 12th Grade

15 Qs

WJEC GCSE ICT Unit 1 E-Mail

WJEC GCSE ICT Unit 1 E-Mail

9th - 10th Grade

13 Qs

Scratch

Scratch

KG - Professional Development

10 Qs

Java: repetition control structure for & while

Java: repetition control structure for & while

10th - 12th Grade

10 Qs

Lesson 1 Introduction to Database System

Lesson 1 Introduction to Database System

10th Grade

10 Qs

Review

Review

9th - 12th Grade

10 Qs

Social Engineering

Social Engineering

Assessment

Quiz

Computers

10th Grade

Medium

Created by

Andy Krebs

Used 18+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What type of Social Engineering is the following scenario?

Sarah, an avid online shopper, decides to browse her favourite e-commerce website to purchase a new laptop. She enters the website's URL into her browser and eagerly awaits the familiar homepage to load. Unbeknownst to Sarah, a pharming attack has compromised the website's DNS infrastructure, redirecting her to a fraudulent version of the site.

The fake website closely mimics the legitimate e-commerce platform, displaying enticing offers and showcasing a wide range of products. Sarah, believing she is on the genuine website, proceeds to search for the desired laptop model. She adds the product to her cart and proceeds to the checkout page.

At the checkout, Sarah enters her personal and payment information, including her name, address, credit card details, and security code. Unaware that the website is fraudulent, she trusts that her transaction is secure and submits the information.

Phishing

Pharming

Shouldering

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a social engineering technique?

Blagging

Hacking

Phishing

Pharming

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which form of Social Engineering is the following scenario?

Emma, a diligent online banking customer, receives an email in her inbox that appears to be from her bank, prompting her to update her account information urgently. The email is convincingly designed, using the bank's logo and colors, and the sender's address seems legitimate at first glance. The message creates a sense of urgency, stating that failure to update her account details within 24 hours will result in the suspension of her online banking services.

In a state of mild panic, Emma clicks on the provided link, which takes her to a website that looks almost identical to her bank's official site. She is greeted with a login page that requests her username, password, and other personal details. The page includes reassuring statements about enhanced security measures to alleviate any suspicions Emma may have.

Phishing

Pharming

Shouldering

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following would probably not help to prevent phishing?

Train employees on security procedures

Set up an auto-reply for e-mails received when you are on holiday

Block e-mails from unknown senders

Investigate content of e-mails to determine trustworthiness

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What type of Social Engineering is the following scenario?

She enters the bustling establishment, finds an empty seat at a corner table, and unpacks her laptop and documents.

Unbeknownst to Emma, an individual named Mark, who is sitting at a nearby table, has malicious intentions. Mark carefully observes Emma as she sets up her workspace. He notices that she occasionally glances at her phone, where she has confidential work-related emails and documents open.

Taking advantage of the crowded environment, Mark positions himself strategically, ensuring that he has a clear line of sight to Emma's phone. He waits for the right moment to strike.

As Emma reaches for her coffee, Mark swiftly leans over, pretending to adjust his belongings, and glances at her phone screen. In just a few seconds, he manages to capture critical information from one of Emma's work emails, including client names, project details, and financial figures.

Phishing

Pharming

Shouldering

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following would best protect against pharming?

Use of e-mail filters

Use of web filters

Using biometric passwords

Disabling USB storage devices

Wearing 3D glasses

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What type of Social Engineering is the following scenario?

Sarah, an avid online shopper, receives an email in her inbox promoting a limited-time offer from a popular online retailer. The email includes eye-catching graphics and a persuasive message, enticing Sarah with a significant discount on her favorite brand of shoes. Excited about the opportunity, she clicks on the provided link to explore the offer further.

The link takes Sarah to a website that closely resembles the online retailer's official site. The page displays the same branding, product images, and layout, creating a convincing illusion of legitimacy. Sarah selects the desired shoes, adds them to her cart, and proceeds to the checkout page.

On the checkout page, she is prompted to enter her personal and payment information, including her full name, address, credit card details, and security code. The page reassures her that the data will be securely processed, employing security logos and trust seals to further instill confidence.

Phishing

Pharming

Shouldering

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?