
2.8 Social Engineering 5
Authored by Amy Austin
Computers
12th Grade
Used 21+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
23 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a characteristic of phishing?
It is easily identifiable as fraudulent.
It appears trustworthy.
It is only sent to a few selected individuals.
It is always blocked by email filters.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How do phishing attackers typically distribute their messages?
By sending personalized emails to each individual.
By posting on social media.
By sending mass emails.
By making phone calls.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes the appearance of phishing emails?
They look suspicious and are easy to spot.
They contain a lot of spelling and grammar mistakes.
They look legitimate.
They are usually filtered into the spam folder.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of the email shown in the image?
To inform Tim Landon about a legitimate transaction
To request personal contact information under the guise of returning money
To confirm a scheduled meeting with Tim Landon
To provide customer service support for a PayPal transaction
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the two key actions involved in Spear Phishing according to the learning material?
Send random emails, Use malware
Gather information, Send specific email
Hack into servers, Steal passwords
Create fake websites, Trick users
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is SMiShing commonly characterized by?
A) A legitimate text message asking for personal information
B) A text message with an urgent topic requiring immediate action and containing a malware link
C) A phone call from a trusted organization
D) An email with a secure attachment
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a method used in pharming to redirect a user's traffic?
Installing antivirus software
DNS cache poisoning
Updating browser
Using a firewall
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?