2.8 Social Engineering 5

2.8 Social Engineering 5

12th Grade

23 Qs

quiz-placeholder

Similar activities

ECDL - Internet Security 2

ECDL - Internet Security 2

7th - 12th Grade

20 Qs

PIK Kg Kadazan ICT & KDB Quiz - March 2021

PIK Kg Kadazan ICT & KDB Quiz - March 2021

1st Grade - Professional Development

20 Qs

CYBERSECURITY EXAM

CYBERSECURITY EXAM

9th - 12th Grade

20 Qs

DIT Semester Exam Ch. 1-2 Review

DIT Semester Exam Ch. 1-2 Review

9th - 12th Grade

20 Qs

Hackers & Cyber Attacks

Hackers & Cyber Attacks

12th Grade

21 Qs

Sociteal Impacts

Sociteal Impacts

12th Grade

20 Qs

cyber security intro

cyber security intro

9th - 12th Grade

18 Qs

Cybersecurity2

Cybersecurity2

12th Grade

20 Qs

2.8 Social Engineering 5

2.8 Social Engineering 5

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Amy Austin

Used 8+ times

FREE Resource

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a characteristic of phishing?

It is easily identifiable as fraudulent.

It appears trustworthy.

It is only sent to a few selected individuals.

It is always blocked by email filters.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do phishing attackers typically distribute their messages?

By sending personalized emails to each individual.

By posting on social media.

By sending mass emails.

By making phone calls.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the appearance of phishing emails?

They look suspicious and are easy to spot.

They contain a lot of spelling and grammar mistakes.

They look legitimate.

They are usually filtered into the spam folder.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the email shown in the image?

To inform Tim Landon about a legitimate transaction

To request personal contact information under the guise of returning money

To confirm a scheduled meeting with Tim Landon

To provide customer service support for a PayPal transaction

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the two key actions involved in Spear Phishing according to the learning material?

Send random emails, Use malware

Gather information, Send specific email

Hack into servers, Steal passwords

Create fake websites, Trick users

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is SMiShing commonly characterized by?

A) A legitimate text message asking for personal information

B) A text message with an urgent topic requiring immediate action and containing a malware link

C) A phone call from a trusted organization

D) An email with a secure attachment

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a method used in pharming to redirect a user's traffic?

Installing antivirus software

DNS cache poisoning

Updating browser

Using a firewall

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?