Foundations of Cyber Security: Quiz 4

Foundations of Cyber Security: Quiz 4

Professional Development

10 Qs

quiz-placeholder

Similar activities

Security I - Day 3 - Review of Day 2

Security I - Day 3 - Review of Day 2

Professional Development

12 Qs

Cybersecurity

Cybersecurity

Professional Development

10 Qs

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

Cyber Security Quiz

Cyber Security Quiz

Professional Development

10 Qs

DST07 Day 1 quiz

DST07 Day 1 quiz

Professional Development

12 Qs

Closing Quiz (Peretas)

Closing Quiz (Peretas)

Professional Development

10 Qs

Cybersecurity vocab :)

Cybersecurity vocab :)

1st Grade - Professional Development

15 Qs

Prevention

Prevention

1st Grade - Professional Development

10 Qs

Foundations of Cyber Security: Quiz 4

Foundations of Cyber Security: Quiz 4

Assessment

Quiz

Computers

Professional Development

Easy

Created by

John Coder

Used 6+ times

FREE Resource

10 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

s_________________ e_________________ is a manipulation technique that exploits human error to gain private information, access, or valuables. Human error is usually a result of trusting someone without question. It’s the mission of a threat actor, acting as a social engineer, to create an environment of false trust and lies to exploit as many people as possible

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A threat actor collects detailed information about their target from social media sites. Then, they initiate an attack.

Social media phishing

Watering hole attack

Baiting

Physical social engineering

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A threat actor attacks a website frequently visited by a specific group of users.

Social media phishing

Watering hole attack

Baiting

Physical social engineering

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A threat actor strategically leaves a malware USB stick for an employee to find and install, to unknowingly infect a network. 

Social media phishing

Watering hole attack

Baiting

Physical social engineering

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a

location.

Social media phishing

Watering hole attack

Baiting

Physical social engineering

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Social engineering is incredibly effective. This is because people are generally trusting and conditioned to respect a___________. The number of social engineering attacks is increasing with every new social media application that allows public access to people's data. Although sharing personal data—such as your l__________ or photos—can be convenient, it’s also a risk.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A tactic used to imply that goods or services are in limited supply. 

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?