2.7 Social Engineering 4

2.7 Social Engineering 4

12th Grade

15 Qs

quiz-placeholder

Similar activities

CTEC IT Unit 3 PH Virtual Challenges

CTEC IT Unit 3 PH Virtual Challenges

12th Grade

10 Qs

Resume Do's and Don'ts

Resume Do's and Don'ts

9th - 12th Grade

10 Qs

Cyber Security Short Answer questions

Cyber Security Short Answer questions

9th - 12th Grade

14 Qs

Online Safety: CyberSecurity

Online Safety: CyberSecurity

6th - 12th Grade

16 Qs

Web Development

Web Development

1st - 12th Grade

10 Qs

Unit 11 Topic E Forensics

Unit 11 Topic E Forensics

12th Grade

10 Qs

2.3.1 CSP Vulnerable User

2.3.1 CSP Vulnerable User

11th - 12th Grade

11 Qs

Python Lists Part 2

Python Lists Part 2

11th Grade - University

20 Qs

2.7 Social Engineering 4

2.7 Social Engineering 4

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Amy Austin

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a characteristic of a targeted attack?

It is less dangerous than other attacks.

It is usually carried out by a single entity.

It involves elicitation.

It uses well-known exploits.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Targeted attacks are generally more dangerous because they:

Are less methodical.

Do not do any damage.

Use known exploits.

Are carried out by multiple entities.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is true about targeted attacks?

They are carried out in a haphazard manner.

They use unknown exploits.

They are less likely to do damage.

They are usually carried out in the open.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of elicitation according to the slide?

To create suspicion

To extract information without raising suspicion

To make the target uncomfortable

To provide information

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of the attacker in the concept of Feign Ignorance?

Provides correct statement

Gives more details

Makes wrong statement

None of the above

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the victim do in response to the attacker in the concept of Feign Ignorance?

Admits ignorance

Provides correct statement

Makes wrong statement

Ignores the attacker

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a way to be a good listener according to the slide?

Share more

Validate feelings

Relate similar experiences

Ignore the speaker

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?