Cyber security

Cyber security

12th Grade

10 Qs

quiz-placeholder

Similar activities

Cybersecurity Quiz

Cybersecurity Quiz

12th Grade

15 Qs

Drawing 1

Drawing 1

12th Grade

10 Qs

Social Engineering

Social Engineering

9th - 12th Grade

8 Qs

social engineering attacks 2

social engineering attacks 2

12th Grade

10 Qs

Technical Terms - Internet (A-Z) - Social Engineering

Technical Terms - Internet (A-Z) - Social Engineering

12th Grade

10 Qs

Malware and Attack Technologies

Malware and Attack Technologies

9th - 12th Grade

12 Qs

Computing figures

Computing figures

4th - 12th Grade

14 Qs

Phishing and spam

Phishing and spam

9th - 12th Grade

10 Qs

Cyber security

Cyber security

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Victoria Price

Used 6+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

A set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes

Society engineering

Social endangering

Social engineering

Social escaping

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is different about social engineering, in comparison to other cybercrimes?

Machines tricking machines

Humans tricking humans

Humans tricking machines

Machines tricking humans

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What do we call an attack that involves the attacker watching the victim while they provide sensitive information?

Shoulder somersaulting

Shoulder suggesting

Shoulder singing

Shoulder surfing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What do we call attacks in which the victim is asked in an app or a social media post to combine a few pieces of information or complete a short quiz to produce a name?

Name generator

Word generator

Guess generator

People generator

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is the name of an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data?


Praying

Phishing

Wishing

Singing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What do we call an attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money?

Blinking

Blasting

Blogging

Blagging

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Media Image

Greatest F1 driver of all time

Lewis Hamilton

Lewis Hamilton

Lewis Hamilton

Lewis Hamilton

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?