Foundations of Cyber Security: Quiz 4

Foundations of Cyber Security: Quiz 4

Professional Development

10 Qs

quiz-placeholder

Similar activities

Social Engineering Scams

Social Engineering Scams

Professional Development

6 Qs

AI and its Risk

AI and its Risk

Professional Development

10 Qs

Cybersecurity & Phishing Quiz

Cybersecurity & Phishing Quiz

Professional Development

15 Qs

Social Engineering

Social Engineering

8th Grade - Professional Development

8 Qs

R&D Days

R&D Days

Professional Development

15 Qs

Kalasag Hacker's Night Game Time

Kalasag Hacker's Night Game Time

KG - Professional Development

15 Qs

Cybersecurity Assessment

Cybersecurity Assessment

Professional Development

8 Qs

Sunset Bank's Information Security Awareness Test

Sunset Bank's Information Security Awareness Test

1st Grade - Professional Development

8 Qs

Foundations of Cyber Security: Quiz 4

Foundations of Cyber Security: Quiz 4

Assessment

Quiz

Computers

Professional Development

Easy

Created by

John Coder

Used 6+ times

FREE Resource

10 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

s_________________ e_________________ is a manipulation technique that exploits human error to gain private information, access, or valuables. Human error is usually a result of trusting someone without question. It’s the mission of a threat actor, acting as a social engineer, to create an environment of false trust and lies to exploit as many people as possible

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A threat actor collects detailed information about their target from social media sites. Then, they initiate an attack.

Social media phishing

Watering hole attack

Baiting

Physical social engineering

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A threat actor attacks a website frequently visited by a specific group of users.

Social media phishing

Watering hole attack

Baiting

Physical social engineering

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A threat actor strategically leaves a malware USB stick for an employee to find and install, to unknowingly infect a network. 

Social media phishing

Watering hole attack

Baiting

Physical social engineering

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a

location.

Social media phishing

Watering hole attack

Baiting

Physical social engineering

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Social engineering is incredibly effective. This is because people are generally trusting and conditioned to respect a___________. The number of social engineering attacks is increasing with every new social media application that allows public access to people's data. Although sharing personal data—such as your l__________ or photos—can be convenient, it’s also a risk.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A tactic used to imply that goods or services are in limited supply. 

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?