Quiz - Garden State Cyber Unit 2.1

Quiz - Garden State Cyber Unit 2.1

9th - 12th Grade

9 Qs

quiz-placeholder

Similar activities

Threats and Social Engineering

Threats and Social Engineering

9th - 10th Grade

10 Qs

Ch 8.1 - System Hacking

Ch 8.1 - System Hacking

12th Grade

9 Qs

Staying Safe on the Internet

Staying Safe on the Internet

10th - 12th Grade

10 Qs

Security Systems - Threats

Security Systems - Threats

10th Grade

14 Qs

Warm-up 6

Warm-up 6

9th - 12th Grade

9 Qs

Ingeniera social

Ingeniera social

8th - 10th Grade

10 Qs

GCSE OCR Computing 1.4.1 - Threats to Computer Systems

GCSE OCR Computing 1.4.1 - Threats to Computer Systems

10th Grade

10 Qs

Phishing Quiz

Phishing Quiz

12th Grade

12 Qs

Quiz - Garden State Cyber Unit 2.1

Quiz - Garden State Cyber Unit 2.1

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

Anthony DellaRosa

Used 1+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 2 pts

Which two of the following step of hacking are most likely to involve the use of social engineering? (pick 2)
Recon / footprinting
Gaining Access
Scanning / Probing
Escalating Privileges
Exploiting

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What is the goal of social engineering?
To make people behave better
To help people make more friends
To get an authorized user to give information to an unauthorized person
To have an unauthorized user to determine a user's password using brute force

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What is the main method used in social engineering?
Brute Force
Deception
Complex Algorithms
Ransom attacks

4.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Which is NOT a reason that Social Engineering is so successful?
Humans want to be helpful
Humans make sloppy mistakes
Humans want to avoid confrontation
Humans are good at problem solving

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Which of the following Social Engineering techniques are best protected against by use of a security guard or turnstile?
Piggybacking
Shoulder Surfing
Dumpster Diving
Baiting

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a technique of social engineering?

Shoulder Surfing

Kneecapping

Piggybacking

Dumpster Diving

7.

OPEN ENDED QUESTION

3 mins • 1 pt

What is social engineering?

Evaluate responses using AI:

OFF

8.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What is it called when you use a phone to perform a social engineering attack

9.

MATCH QUESTION

1 min • 1 pt

Match the following

Pretexting

this is where someone goes through a door after you have swiped in OR you hold the door open for them without making them authenticate.

Dumpster diving

Wearing a “uniform” or using authority –an IT Tech support type of uniform that will get access to a computer

Scareware

retrieve discarded paper information

Baiting

making people believe that malware has been installed and that they need to give you access or install software to “fix it”

Piggybacking

offering something of value such as a prize if you click or leaving a USB drive to be found.