Social Engineering

Social Engineering

10th Grade

11 Qs

quiz-placeholder

Similar activities

Data Stealing and Malware

Data Stealing and Malware

9th - 11th Grade

10 Qs

S3 Computing Security Quiz

S3 Computing Security Quiz

KG - University

10 Qs

Identifying and Preventing Vulnerabilities

Identifying and Preventing Vulnerabilities

10th Grade

15 Qs

Found. of IT: Security Threats - B

Found. of IT: Security Threats - B

9th - 12th Grade

10 Qs

Cyber Security KS4

Cyber Security KS4

8th - 12th Grade

15 Qs

Online Safety: CyberSecurity

Online Safety: CyberSecurity

6th - 12th Grade

16 Qs

Network Security Basics

Network Security Basics

10th Grade

15 Qs

1.6 Threats to networks 1: People as the weak point

1.6 Threats to networks 1: People as the weak point

10th Grade

12 Qs

Social Engineering

Social Engineering

Assessment

Quiz

Computers

10th Grade

Medium

Created by

Andy Krebs

Used 18+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What type of Social Engineering is the following scenario?

Sarah, an avid online shopper, decides to browse her favourite e-commerce website to purchase a new laptop. She enters the website's URL into her browser and eagerly awaits the familiar homepage to load. Unbeknownst to Sarah, a pharming attack has compromised the website's DNS infrastructure, redirecting her to a fraudulent version of the site.

The fake website closely mimics the legitimate e-commerce platform, displaying enticing offers and showcasing a wide range of products. Sarah, believing she is on the genuine website, proceeds to search for the desired laptop model. She adds the product to her cart and proceeds to the checkout page.

At the checkout, Sarah enters her personal and payment information, including her name, address, credit card details, and security code. Unaware that the website is fraudulent, she trusts that her transaction is secure and submits the information.

Phishing

Pharming

Shouldering

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a social engineering technique?

Blagging

Hacking

Phishing

Pharming

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which form of Social Engineering is the following scenario?

Emma, a diligent online banking customer, receives an email in her inbox that appears to be from her bank, prompting her to update her account information urgently. The email is convincingly designed, using the bank's logo and colors, and the sender's address seems legitimate at first glance. The message creates a sense of urgency, stating that failure to update her account details within 24 hours will result in the suspension of her online banking services.

In a state of mild panic, Emma clicks on the provided link, which takes her to a website that looks almost identical to her bank's official site. She is greeted with a login page that requests her username, password, and other personal details. The page includes reassuring statements about enhanced security measures to alleviate any suspicions Emma may have.

Phishing

Pharming

Shouldering

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following would probably not help to prevent phishing?

Train employees on security procedures

Set up an auto-reply for e-mails received when you are on holiday

Block e-mails from unknown senders

Investigate content of e-mails to determine trustworthiness

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What type of Social Engineering is the following scenario?

She enters the bustling establishment, finds an empty seat at a corner table, and unpacks her laptop and documents.

Unbeknownst to Emma, an individual named Mark, who is sitting at a nearby table, has malicious intentions. Mark carefully observes Emma as she sets up her workspace. He notices that she occasionally glances at her phone, where she has confidential work-related emails and documents open.

Taking advantage of the crowded environment, Mark positions himself strategically, ensuring that he has a clear line of sight to Emma's phone. He waits for the right moment to strike.

As Emma reaches for her coffee, Mark swiftly leans over, pretending to adjust his belongings, and glances at her phone screen. In just a few seconds, he manages to capture critical information from one of Emma's work emails, including client names, project details, and financial figures.

Phishing

Pharming

Shouldering

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following would best protect against pharming?

Use of e-mail filters

Use of web filters

Using biometric passwords

Disabling USB storage devices

Wearing 3D glasses

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What type of Social Engineering is the following scenario?

Sarah, an avid online shopper, receives an email in her inbox promoting a limited-time offer from a popular online retailer. The email includes eye-catching graphics and a persuasive message, enticing Sarah with a significant discount on her favorite brand of shoes. Excited about the opportunity, she clicks on the provided link to explore the offer further.

The link takes Sarah to a website that closely resembles the online retailer's official site. The page displays the same branding, product images, and layout, creating a convincing illusion of legitimacy. Sarah selects the desired shoes, adds them to her cart, and proceeds to the checkout page.

On the checkout page, she is prompted to enter her personal and payment information, including her full name, address, credit card details, and security code. The page reassures her that the data will be securely processed, employing security logos and trust seals to further instill confidence.

Phishing

Pharming

Shouldering

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?