2.6 Social Engineering 3

2.6 Social Engineering 3

12th Grade

12 Qs

quiz-placeholder

Similar activities

Raas Cyber Security

Raas Cyber Security

7th Grade - Professional Development

15 Qs

Unit 3 - 2.4.12 Application Attacks Part 2

Unit 3 - 2.4.12 Application Attacks Part 2

9th Grade - University

7 Qs

COMMON ISSUES IN COMPUTER SYSTEMS

COMMON ISSUES IN COMPUTER SYSTEMS

12th Grade

10 Qs

2.3 Motivation of attackers

2.3 Motivation of attackers

12th Grade

10 Qs

Understanding Social Engineering Techniques

Understanding Social Engineering Techniques

12th Grade

10 Qs

Quiz # 3 Asignacion

Quiz # 3 Asignacion

7th - 12th Grade

10 Qs

Safer Internet Quiz Bee

Safer Internet Quiz Bee

11th - 12th Grade

10 Qs

Exploring the Internet of Things

Exploring the Internet of Things

9th Grade - University

10 Qs

2.6 Social Engineering 3

2.6 Social Engineering 3

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Amy Austin

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term is used to describe the act of looking over someone's shoulder to gather information without their knowledge?

Browsing Sniping

Shoulder Surfing

Back Watching

Screen Peeking

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why are USB devices considered risky?

They have high storage capacity.

They offer strong encryption.

They have no access controls.

They are expensive to replace.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a keylogger do?

Encrypts data for secure transmission.

Captures usernames and passwords.

Blocks unauthorized access to systems.

Detects and removes viruses.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common characteristic of Spam?

Malicious link

Instant messaging

Banner ads

Embedded URL

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Spim is typically associated with which of the following?

Spam emails

Banner ads

Instant messaging

Embedded URL

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a characteristic of a hoax?

Bad spelling

Good grammar

Many tactics

Convincing to target

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT listed as a motivation for cybercriminals?

Financial gain

Risk-taking

Educational purposes

Revenge politics

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?