Social Engineering

Quiz
•
Computers
•
10th Grade
•
Medium
Andy Krebs
Used 18+ times
FREE Resource
11 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What type of Social Engineering is the following scenario?
Sarah, an avid online shopper, decides to browse her favourite e-commerce website to purchase a new laptop. She enters the website's URL into her browser and eagerly awaits the familiar homepage to load. Unbeknownst to Sarah, a pharming attack has compromised the website's DNS infrastructure, redirecting her to a fraudulent version of the site.
The fake website closely mimics the legitimate e-commerce platform, displaying enticing offers and showcasing a wide range of products. Sarah, believing she is on the genuine website, proceeds to search for the desired laptop model. She adds the product to her cart and proceeds to the checkout page.
At the checkout, Sarah enters her personal and payment information, including her name, address, credit card details, and security code. Unaware that the website is fraudulent, she trusts that her transaction is secure and submits the information.
Phishing
Pharming
Shouldering
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is not a social engineering technique?
Blagging
Hacking
Phishing
Pharming
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which form of Social Engineering is the following scenario?
Emma, a diligent online banking customer, receives an email in her inbox that appears to be from her bank, prompting her to update her account information urgently. The email is convincingly designed, using the bank's logo and colors, and the sender's address seems legitimate at first glance. The message creates a sense of urgency, stating that failure to update her account details within 24 hours will result in the suspension of her online banking services.
In a state of mild panic, Emma clicks on the provided link, which takes her to a website that looks almost identical to her bank's official site. She is greeted with a login page that requests her username, password, and other personal details. The page includes reassuring statements about enhanced security measures to alleviate any suspicions Emma may have.
Phishing
Pharming
Shouldering
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following would probably not help to prevent phishing?
Train employees on security procedures
Set up an auto-reply for e-mails received when you are on holiday
Block e-mails from unknown senders
Investigate content of e-mails to determine trustworthiness
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What type of Social Engineering is the following scenario?
She enters the bustling establishment, finds an empty seat at a corner table, and unpacks her laptop and documents.
Unbeknownst to Emma, an individual named Mark, who is sitting at a nearby table, has malicious intentions. Mark carefully observes Emma as she sets up her workspace. He notices that she occasionally glances at her phone, where she has confidential work-related emails and documents open.
Taking advantage of the crowded environment, Mark positions himself strategically, ensuring that he has a clear line of sight to Emma's phone. He waits for the right moment to strike.
As Emma reaches for her coffee, Mark swiftly leans over, pretending to adjust his belongings, and glances at her phone screen. In just a few seconds, he manages to capture critical information from one of Emma's work emails, including client names, project details, and financial figures.
Phishing
Pharming
Shouldering
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following would best protect against pharming?
Use of e-mail filters
Use of web filters
Using biometric passwords
Disabling USB storage devices
Wearing 3D glasses
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What type of Social Engineering is the following scenario?
Sarah, an avid online shopper, receives an email in her inbox promoting a limited-time offer from a popular online retailer. The email includes eye-catching graphics and a persuasive message, enticing Sarah with a significant discount on her favorite brand of shoes. Excited about the opportunity, she clicks on the provided link to explore the offer further.
The link takes Sarah to a website that closely resembles the online retailer's official site. The page displays the same branding, product images, and layout, creating a convincing illusion of legitimacy. Sarah selects the desired shoes, adds them to her cart, and proceeds to the checkout page.
On the checkout page, she is prompted to enter her personal and payment information, including her full name, address, credit card details, and security code. The page reassures her that the data will be securely processed, employing security logos and trust seals to further instill confidence.
Phishing
Pharming
Shouldering
Create a free account and access millions of resources
Similar Resources on Wayground
12 questions
BJC Unit 2 Concepts Review

Quiz
•
10th Grade - University
10 questions
Quiz 1 - Video Game Design

Quiz
•
9th - 12th Grade
11 questions
Scams and Schemes

Quiz
•
KG - University
12 questions
1.6 Threats to networks 1: People as the weak point

Quiz
•
10th Grade
15 questions
Identifying and Preventing Vulnerabilities

Quiz
•
10th Grade
10 questions
Found. of IT: Security Threats - B

Quiz
•
9th - 12th Grade
12 questions
Cyber Security Recap

Quiz
•
10th Grade
14 questions
Social engineering 1

Quiz
•
10th Grade
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
20 questions
Analog vs Digital

Quiz
•
9th - 12th Grade
10 questions
Exploring Cybersecurity Techniques and Threats

Interactive video
•
6th - 10th Grade
10 questions
Understanding the Internet and Data Transmission

Interactive video
•
7th - 12th Grade