
SOCIAL ENGINEERING
Authored by Vikas Soni
Computers
8th Grade
Used 200+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
16 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How are people targeted through Phishing?
via Email
on Websites
2.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Which of these are warning signs of a phishing scam?
incorrect "from" address
Pressure to rush
Social Pressures
Suspicious links in the email
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Social Engineering takes advantage of which security flaw in a computer system?
The User
The Network
The Password
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What cyber scam is described by this statement - "a cyber attack intended to redirect a website's traffic to another, fake site."
Phishing
Pharming
DNS Hijacking
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How are people targeted through Pharming?
via Email
on Websites
6.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Which Social Engineering Techniques can be seen in this email?
Social Pressure - Legal Authority
Financial Pressure
Threat
Blackmail
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
True or False: You can always tell the difference between a real website and a fake pharming website?
true
false
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?