Search Header Logo

Social Engineering Quiz

Authored by Anthony Moore

Social Studies

3rd Grade

Social Engineering Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

Phishing is a type of fishing done in the ocean

Phishing is a type of cyber attack where attackers impersonate legitimate organizations to trick individuals into providing sensitive information.

Phishing is a type of bird species found in South America

Phishing is a type of gardening technique

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you identify a phishing email?

By clicking on all the links and attachments in the email

By responding to the email with personal information

By looking for spelling and grammar errors, asking for personal information, or having suspicious links or attachments.

By ignoring all the spelling and grammar errors in the email

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to be cautious of clicking on links in emails from unknown senders?

To make new friends

To support unknown businesses

To avoid falling victim to phishing scams, malware, or other security threats.

To increase email traffic

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is identity theft?

Creating a new identity for oneself

Using someone's personal information to throw them a surprise party

Stealing physical belongings from someone

The unauthorized use of someone's personal information for financial gain or other fraudulent activities.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you protect yourself from identity theft?

Monitor credit report, use strong passwords, be cautious with personal information

Share personal information with strangers

Ignore suspicious activity on credit report

Use the same password for all accounts

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do if you suspect that your identity has been stolen?

Confront the suspected thief in person

Ignore the situation and hope it goes away on its own

Share your personal information with more people to try to catch the thief

Contact your bank and credit card companies, place a fraud alert on your credit reports, and report the identity theft to the Federal Trade Commission.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is social media manipulation?

The use of social media to promote positive messages and connect with friends

The use of social media platforms to spread misinformation, manipulate public opinion, or deceive users for political, financial, or personal gain.

The process of creating engaging content for social media platforms

The act of using social media to organize events and gatherings

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?