Search Header Logo

Foundations of Cyber Security: Quiz 4

Authored by John Coder

Computers

Professional Development

Used 6+ times

Foundations of Cyber Security: Quiz 4
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

s_________________ e_________________ is a manipulation technique that exploits human error to gain private information, access, or valuables. Human error is usually a result of trusting someone without question. It’s the mission of a threat actor, acting as a social engineer, to create an environment of false trust and lies to exploit as many people as possible

(a)  

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A threat actor collects detailed information about their target from social media sites. Then, they initiate an attack.

Social media phishing

Watering hole attack

Baiting

Physical social engineering

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A threat actor attacks a website frequently visited by a specific group of users.

Social media phishing

Watering hole attack

Baiting

Physical social engineering

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A threat actor strategically leaves a malware USB stick for an employee to find and install, to unknowingly infect a network. 

Social media phishing

Watering hole attack

Baiting

Physical social engineering

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a

location.

Social media phishing

Watering hole attack

Baiting

Physical social engineering

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Social engineering is incredibly effective. This is because people are generally trusting and conditioned to respect a___________. The number of social engineering attacks is increasing with every new social media application that allows public access to people's data. Although sharing personal data—such as your l__________ or photos—can be convenient, it’s also a risk.

(a)  

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A tactic used to imply that goods or services are in limited supply. 

(a)  

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?