Lesson 2: Social engineering Homework

Lesson 2: Social engineering Homework

9th Grade

6 Qs

quiz-placeholder

Similar activities

Cyber security quizlet

Cyber security quizlet

8th - 9th Grade

10 Qs

SLR 4 - Cyber Security Threats - part 1

SLR 4 - Cyber Security Threats - part 1

9th - 11th Grade

10 Qs

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

Data Stealing and Malware

Data Stealing and Malware

9th - 11th Grade

10 Qs

Grade 9 CW

Grade 9 CW

9th Grade

3 Qs

Cybersecurity Fundamentals Week 1 Quiz

Cybersecurity Fundamentals Week 1 Quiz

KG - University

10 Qs

Cybersecurity threats 1

Cybersecurity threats 1

9th Grade

10 Qs

AQA GCSE Computer Science - 3.6.1.1 Pharming & Shouldering

AQA GCSE Computer Science - 3.6.1.1 Pharming & Shouldering

8th - 10th Grade

10 Qs

Lesson 2: Social engineering Homework

Lesson 2: Social engineering Homework

Assessment

Quiz

Computers

9th Grade

Hard

Created by

S Shanmugalingam

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False

A Social engineering is the tactic of manipulating, influencing, or deceiving a victim in order to gain control over a computer system, or to steal personal and financial information.

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Another term for Shouldering 

Shoulder Surfing

Overlooking

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False

Shouldering is an attack designed to steal a victim's password or other sensitive data. 


True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which term is used, when attacks in the victim is asked in an app or a social media post to combine a few pieces of information or complete a short quiz to produce a name.

identification attack

Name generator attacks

5.

OPEN ENDED QUESTION

3 mins • 1 pt

Media Image

What is a phishing attack?

Evaluate responses using AI:

OFF

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Media Image

Blagging (also known as ---------- ) is an attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money.