
Foundations of Cyber Security: Quiz 4
Authored by John Coder
Computers
Professional Development
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
1 min • 1 pt
s_________________ e_________________ is a manipulation technique that exploits human error to gain private information, access, or valuables. Human error is usually a result of trusting someone without question. It’s the mission of a threat actor, acting as a social engineer, to create an environment of false trust and lies to exploit as many people as possible
(a)
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A threat actor collects detailed information about their target from social media sites. Then, they initiate an attack.
Social media phishing
Watering hole attack
Baiting
Physical social engineering
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A threat actor attacks a website frequently visited by a specific group of users.
Social media phishing
Watering hole attack
Baiting
Physical social engineering
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A threat actor strategically leaves a malware USB stick for an employee to find and install, to unknowingly infect a network.
Social media phishing
Watering hole attack
Baiting
Physical social engineering
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a
location.
Social media phishing
Watering hole attack
Baiting
Physical social engineering
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Social engineering is incredibly effective. This is because people are generally trusting and conditioned to respect a___________. The number of social engineering attacks is increasing with every new social media application that allows public access to people's data. Although sharing personal data—such as your l__________ or photos—can be convenient, it’s also a risk.
(a)
7.
FILL IN THE BLANK QUESTION
1 min • 1 pt
A tactic used to imply that goods or services are in limited supply.
(a)
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?