Social Engineering Quiz

Social Engineering Quiz

12th Grade

9 Qs

quiz-placeholder

Similar activities

Kulturang Popular - Filipino 35

Kulturang Popular - Filipino 35

5th Grade - University

13 Qs

Module 4 Lesson 2 Vocabulary

Module 4 Lesson 2 Vocabulary

6th Grade - University

11 Qs

Basketball's Best

Basketball's Best

5th Grade - University

10 Qs

Marcos o Du30?

Marcos o Du30?

4th Grade - University

8 Qs

PH Presidents

PH Presidents

9th - 12th Grade

10 Qs

SSC 101

SSC 101

6th Grade - University

10 Qs

Philippine History Trivia

Philippine History Trivia

10th Grade - University

10 Qs

Future Jobs

Future Jobs

9th - 12th Grade

10 Qs

Social Engineering Quiz

Social Engineering Quiz

Assessment

Quiz

Social Studies

12th Grade

Medium

Created by

Anthony DellaRosa

Used 1+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jason received an email from an unknown source claiming to be from his bank and asking for his login credentials. What is the goal of this social engineering attempt?

To gain unauthorized access to Jason's bank account

To deceive and trick Jason, an authorized user

To obtain information or access from Jason, an unauthorized person

To protect the human factors in Jason's technology environment

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Gerard, Brennan, and Zac are attending a cybersecurity workshop. They discuss various methods used by hackers to gain unauthorized access. In a real-world scenario, which method, often used in social engineering, involves manipulation rather than technical skills?

Using physical force and intimidation

Employing deception and trickery

Applying encryption and authentication

Installing firewalls and antivirus software

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

During a cybersecurity workshop, Jesus and Jason participated in a simulation where they had to identify different steps of hacking. Which of these steps indicate that humans are the targets in the simulation?

Recon

Scanning

Gaining Access

Maintaining Access

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why was the social engineering attack on the company where Brennan and Jason work so successful?

Because Brennan, Jason, and their colleagues wanted to be helpful

Because Brennan, Jason, and their colleagues wanted to avoid confrontation

Because Brennan, Jason, and their colleagues often made sloppy mistakes

All of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Brennan, Gerard, and Marcos are discussing different techniques of social engineering they learned in their cybersecurity class. Brennan talks about piggybacking and shoulder surfing, Gerard mentions dumpster diving and scareware, and Marcos brings up pretexting and phishing. Which of these discussions are examples of social engineering techniques?

Brennan's discussion about piggybacking and shoulder surfing

Gerard's discussion about dumpster diving and scareware

Marcos's discussion about pretexting and phishing

All of the above

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jason received an email from someone claiming to be his bank, asking for his account details. Which common method used by hackers in social engineering does this scenario represent, involving manipulation rather than technical skills?

Using physical force and intimidation

Employing deception and trickery

Applying encryption and authentication

Installing firewalls and antivirus software

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Gerard received an email from an unknown source asking for his login credentials. What could be the goal of this social engineering attempt?

To gain unauthorized access to Gerard's system

To deceive and trick Gerard, an authorized user

To obtain information or access from Gerard, an unauthorized person

To protect the human factors in Gerard's technology environment

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why was the social engineering attack on the tech company where Jesus, Gerard, and Marcos work so successful?

Because Gerard, being a kind-hearted employee, wanted to be helpful

Because Marcos, a peace-loving individual, wanted to avoid confrontation

Because Jason, despite being diligent, often made sloppy mistakes

All of the above

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Gerard and Brennan are having a discussion. Which of the following topics they are discussing could be considered as examples of social engineering techniques?

Gerard and Jesus are discussing about piggybacking and shoulder surfing

Jason and Marcos are discussing about dumpster diving and scareware

Brennan is discussing about pretexting and phishing

All of the above