2.5 Social Engineering -2

2.5 Social Engineering -2

12th Grade

11 Qs

quiz-placeholder

Similar activities

IBA/CIW REVIEW TEST-B

IBA/CIW REVIEW TEST-B

9th - 12th Grade

15 Qs

CTEC IT Unit 3 PH Virtual Challenges

CTEC IT Unit 3 PH Virtual Challenges

12th Grade

10 Qs

PF 3.07 Getting Paid

PF 3.07 Getting Paid

9th - 12th Grade

12 Qs

Online Communities

Online Communities

1st - 12th Grade

10 Qs

ONLINE PLATFORMS

ONLINE PLATFORMS

12th Grade

15 Qs

cybersecurity_1

cybersecurity_1

12th Grade

14 Qs

IT Security Threats

IT Security Threats

10th - 12th Grade

11 Qs

Chapter 7: Risk, Reputation, & Crisis Review (1)

Chapter 7: Risk, Reputation, & Crisis Review (1)

12th Grade

10 Qs

2.5 Social Engineering -2

2.5 Social Engineering -2

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Amy Austin

Used 1+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is considered the only solution to social engineering according to the learning material?

Frequent software updates

Stronger passwords

Education

Advanced firewalls

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT mentioned as a characteristic of social engineering in the learning material?

Hard to deflect

Hard to track

Easy to prevent

Hard to catch

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT listed as a factor of manipulation and motivation?

Moral obligation

Trust

Curiosity

Greed

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is considered a factor of manipulation and motivation according to the slide?

Kindness

Ignorance

Wisdom

Education

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a stage in the Social Engineering Process?

Research

Development

Exploitation

Maintenance

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a part of the Exploitation Phase in security?

Disclose password and username

Provide social proof

Perform social engineering

Expose trade secrets

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one of the actions that can be taken during the Exploitation Phase to compromise security?

Update antivirus software

Insert a malicious payload

Change passwords regularly

Use two-factor authentication

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?