
Phishing Quiz
Authored by Jonathon Ownby
Computers
12th Grade
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 4 pts
Which of the following steps of hacking are most likely to involve the use of social engineering?
Escalating Privileges
Recon / footprinting
2.
MULTIPLE CHOICE QUESTION
2 mins • 4 pts
What is the goal of social engineering?
3.
MULTIPLE CHOICE QUESTION
2 mins • 4 pts
What is the main method used in social engineering?
4.
MULTIPLE CHOICE QUESTION
2 mins • 4 pts
Which is NOT a reason that Social Engineering is so successful?
5.
MULTIPLE CHOICE QUESTION
2 mins • 4 pts
Which of the following Social Engineering techniques are best protected against by use of a security guard or turnstile?
6.
MULTIPLE CHOICE QUESTION
2 mins • 4 pts
This is considered the single biggest threat in the digital world and was used in 67% of cyber attacks last year?
7.
MULTIPLE CHOICE QUESTION
2 mins • 4 pts
Which of the following is NOT an indication that the email might be a phishing email?
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?