Unit 2 -Cyber

Unit 2 -Cyber

9th - 12th Grade

14 Qs

quiz-placeholder

Similar activities

8525 AQA GCSE  3.1.1 Pseudo-code

8525 AQA GCSE 3.1.1 Pseudo-code

10th - 11th Grade

14 Qs

UNIT 1.2 MEMORY

UNIT 1.2 MEMORY

10th Grade

19 Qs

After Effect Intoduction

After Effect Intoduction

10th Grade - University

15 Qs

Google Aptitude Test

Google Aptitude Test

KG - University

10 Qs

Inspire - AI Trivia

Inspire - AI Trivia

11th Grade

10 Qs

OOP 1 Undiksha

OOP 1 Undiksha

12th Grade - University

13 Qs

Empowerment Technologies Quiz 2

Empowerment Technologies Quiz 2

11th Grade

10 Qs

Cyber Security

Cyber Security

1st - 10th Grade

10 Qs

Unit 2 -Cyber

Unit 2 -Cyber

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Medium

Created by

Anthony DellaRosa

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

14 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two of the following steps of hacking are most likely to involve the use of social engineering? (pick 2)

Scanning / Probing
Escalating Privileges
Exploiting

Recon/footprinting

Gaining Access

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the goal of social engineering?

To make people behave better
To help people make more friends
To have an unauthorized user to determine a user's password using brute force
To get an authorized user to give information to an unauthorized person

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the main method used in social engineering?

Brute Force
Complex Algorithms
Ransom attacks
Deception

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which is NOT a reason that Social Engineering is so successful?

Humans want to avoid confrontation
Humans make sloppy mistakes
Humans want to be helpful
Humans are good at problem solving

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following Social Engineering techniques are best protected against by use of a security guard or turnstile?

Shoulder Surfing
Dumpster Diving
Baiting
Piggybacking

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

This is considered the single biggest threat in the digital world and was used in 67% of cyber attacks last year?

Shoulder Surfing
Piggybacking
Dumpster Diving
Phishing

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is NOT an indication that the email might be a phishing email?

URL doesn't match the text
Misspellings
Sender and email address don't match
Email was sent in the middle of the night

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?