Search Header Logo

2.6 Social Engineering 3

Authored by Amy Austin

Computers

12th Grade

2.6 Social Engineering 3
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term is used to describe the act of looking over someone's shoulder to gather information without their knowledge?

Browsing Sniping

Shoulder Surfing

Back Watching

Screen Peeking

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why are USB devices considered risky?

They have high storage capacity.

They offer strong encryption.

They have no access controls.

They are expensive to replace.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a keylogger do?

Encrypts data for secure transmission.

Captures usernames and passwords.

Blocks unauthorized access to systems.

Detects and removes viruses.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common characteristic of Spam?

Malicious link

Instant messaging

Banner ads

Embedded URL

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Spim is typically associated with which of the following?

Spam emails

Banner ads

Instant messaging

Embedded URL

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a characteristic of a hoax?

Bad spelling

Good grammar

Many tactics

Convincing to target

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT listed as a motivation for cybercriminals?

Financial gain

Risk-taking

Educational purposes

Revenge politics

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?