2.8 Social Engineering 5

2.8 Social Engineering 5

12th Grade

23 Qs

quiz-placeholder

Similar activities

cyber security intro

cyber security intro

9th - 12th Grade

18 Qs

Cybersecurity2

Cybersecurity2

12th Grade

20 Qs

Cyber Security

Cyber Security

9th - 12th Grade

18 Qs

Gettin' Hacked is Wack

Gettin' Hacked is Wack

6th Grade - University

19 Qs

Digital Media - Chapter 1

Digital Media - Chapter 1

9th - 12th Grade

20 Qs

025_Other Social Engineering Attacks–CompTIA Security+ SY0-701

025_Other Social Engineering Attacks–CompTIA Security+ SY0-701

9th - 12th Grade

20 Qs

Hackers & Cyber Attacks

Hackers & Cyber Attacks

12th Grade

21 Qs

036_Supply Chain Vulnerabilities – CompTIA Security+

036_Supply Chain Vulnerabilities – CompTIA Security+

9th - 12th Grade

20 Qs

2.8 Social Engineering 5

2.8 Social Engineering 5

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Amy Austin

Used 8+ times

FREE Resource

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a characteristic of phishing?

It is easily identifiable as fraudulent.

It appears trustworthy.

It is only sent to a few selected individuals.

It is always blocked by email filters.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do phishing attackers typically distribute their messages?

By sending personalized emails to each individual.

By posting on social media.

By sending mass emails.

By making phone calls.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the appearance of phishing emails?

They look suspicious and are easy to spot.

They contain a lot of spelling and grammar mistakes.

They look legitimate.

They are usually filtered into the spam folder.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the email shown in the image?

To inform Tim Landon about a legitimate transaction

To request personal contact information under the guise of returning money

To confirm a scheduled meeting with Tim Landon

To provide customer service support for a PayPal transaction

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the two key actions involved in Spear Phishing according to the learning material?

Send random emails, Use malware

Gather information, Send specific email

Hack into servers, Steal passwords

Create fake websites, Trick users

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is SMiShing commonly characterized by?

A) A legitimate text message asking for personal information

B) A text message with an urgent topic requiring immediate action and containing a malware link

C) A phone call from a trusted organization

D) An email with a secure attachment

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a method used in pharming to redirect a user's traffic?

Installing antivirus software

DNS cache poisoning

Updating browser

Using a firewall

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?