
Social Engineering Pt1
Authored by O Hawkridge
Computers
8th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Protecting networks, computers and programs from attack, damage and unauthorised access
Cyber security
Unpatched software
Trojan
Spyware
Virus
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A cyber attack designed to manipulate people to give out private or confidential information
Social engineering
Unauthorised access
Cyber attack
Cyber security
Unpatched software
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The social engineering attack of obtaining a PIN or password by watching someone type it in, also called Shoulder Surfing
Shouldering
Social engineering
Unauthorised access
Cyber attack
Cyber security
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Also called "pretexting", creating a scenario to encourage the victim to divulge information, e.g. "my boss is on the phone he needs his password now!"
Blagging
Phishing
Shouldering
Social engineering
Unauthorised access
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Malicious software such as viruses, trojans and spyware
Malware
Hacker
Blagging
Phishing
Shouldering
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A piece of malware that replicates when its host file is executed
Virus
Access rights
Default password
Weak password
Pharming
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A type of malware that secretly steals data and sends it to an attacker
Spyware
Virus
Access rights
Default password
Weak password
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?