
Social Engineering Techniques

Quiz
•
Computers
•
12th Grade
•
Medium
Zayd .
Used 1+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is a common method used in phishing attacks to trick individuals into providing sensitive information?
Deceptive emails
Fake websites
Bogus text messages
Phony phone calls
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
How can social media manipulation be used to deceive people?
By collaborating with fact-checking organizations
By sharing only verified information
By promoting critical thinking skills
By spreading false information, creating fake accounts, manipulating algorithms, and exploiting psychological vulnerabilities.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is an example of an impersonation technique used in social engineering?
Phishing
Spoofing
Vishing
Smishing
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is tailgating in the context of social engineering?
Unauthorized access to a restricted area by closely following an authorized person.
Sharing recipes at a social gathering
Driving too closely behind another vehicle
Using a fake ID to enter a bar
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
How can impersonation on social networks be used to manipulate individuals?
By using emojis in messages to build rapport
By sending friend requests to gather personal data
By creating fake events to lure individuals
By gaining trust through fake accounts, spreading misinformation, phishing for personal information, or engaging in social engineering tactics.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is the main goal of a phishing attack?
To deceive individuals into providing sensitive information
To educate individuals on online safety
To provide accurate information to individuals
To enhance cybersecurity measures
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
How can social media manipulation be used to spread misinformation?
By promoting fact-checking and accuracy
By collaborating with reputable sources
By creating fake accounts, using bots, manipulating algorithms, and exploiting echo chambers.
By encouraging critical thinking and skepticism
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
Technical Terms - Internet (A-Z) - VIP

Quiz
•
12th Grade
15 questions
Quiz-INTRODUCTION TO SERVER COMPUTING

Quiz
•
12th Grade
10 questions
Introduction to Cyber Security Exam

Quiz
•
9th - 12th Grade
7 questions
cybersecurity Do now week2

Quiz
•
12th Grade
10 questions
Types of Computing Devices

Quiz
•
9th - 12th Grade
10 questions
MIL Reviewer 2 - DepEd Common

Quiz
•
12th Grade
8 questions
Keamanan Jaringan

Quiz
•
12th Grade
8 questions
Unit 2 - 2.2.3 Phishing and Spam

Quiz
•
9th Grade - University
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
20 questions
Digital Citizenship

Quiz
•
8th - 12th Grade
35 questions
Computer Baseline Examination 2025-26

Quiz
•
9th - 12th Grade
13 questions
Problem Solving Process

Quiz
•
9th - 12th Grade
10 questions
Understanding Algorithms with Pseudocode and Flowcharts

Interactive video
•
9th - 12th Grade
19 questions
AP CSP Unit 1 Review (code.org)

Quiz
•
10th - 12th Grade