
Cyber security
Authored by Victoria Price
Computers
12th Grade
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes
Society engineering
Social endangering
Social engineering
Social escaping
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is different about social engineering, in comparison to other cybercrimes?
Machines tricking machines
Humans tricking humans
Humans tricking machines
Machines tricking humans
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do we call an attack that involves the attacker watching the victim while they provide sensitive information?
Shoulder somersaulting
Shoulder suggesting
Shoulder singing
Shoulder surfing
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do we call attacks in which the victim is asked in an app or a social media post to combine a few pieces of information or complete a short quiz to produce a name?
Name generator
Word generator
Guess generator
People generator
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the name of an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data?
Praying
Phishing
Wishing
Singing
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do we call an attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money?
Blinking
Blasting
Blogging
Blagging
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Greatest F1 driver of all time
Lewis Hamilton
Lewis Hamilton
Lewis Hamilton
Lewis Hamilton
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Phishing and spam
Quiz
•
9th - 12th Grade
14 questions
Internet terminology
Quiz
•
10th - 12th Grade
10 questions
Welcome to Cyber Security
Quiz
•
7th - 12th Grade
10 questions
Teknik Pergerakan Kamera (Pretest)
Quiz
•
12th Grade
15 questions
Form Edublocks
Quiz
•
4th Grade - University
10 questions
Basics of computer
Quiz
•
9th - 12th Grade
15 questions
Cyber Safety
Quiz
•
9th - 12th Grade
11 questions
IT Security Threats
Quiz
•
10th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade