Social Engineering Techniques

Social Engineering Techniques

12th Grade

10 Qs

quiz-placeholder

Similar activities

Linux-2 Quiz 2 -- LAMP

Linux-2 Quiz 2 -- LAMP

1st - 12th Grade

15 Qs

Empowerment Technologies

Empowerment Technologies

KG - 12th Grade

15 Qs

Pre-test: On Online searching by Innovative Teaching Ideas)

Pre-test: On Online searching by Innovative Teaching Ideas)

6th - 12th Grade

14 Qs

Scratch

Scratch

KG - Professional Development

10 Qs

Intro to Computer Programming

Intro to Computer Programming

9th - 12th Grade

14 Qs

MEDIA AND INFORMATION LITERACY

MEDIA AND INFORMATION LITERACY

12th Grade

10 Qs

ICT Assesment

ICT Assesment

10th Grade - University

15 Qs

Cyber Security KS4

Cyber Security KS4

8th - 12th Grade

15 Qs

Social Engineering Techniques

Social Engineering Techniques

Assessment

Quiz

Computers

12th Grade

Practice Problem

Medium

Created by

Zayd .

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is a common method used in phishing attacks to trick individuals into providing sensitive information?

Deceptive emails

Fake websites

Bogus text messages

Phony phone calls

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

How can social media manipulation be used to deceive people?

By collaborating with fact-checking organizations

By sharing only verified information

By promoting critical thinking skills

By spreading false information, creating fake accounts, manipulating algorithms, and exploiting psychological vulnerabilities.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is an example of an impersonation technique used in social engineering?

Phishing

Spoofing

Vishing

Smishing

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is tailgating in the context of social engineering?

Unauthorized access to a restricted area by closely following an authorized person.

Sharing recipes at a social gathering

Driving too closely behind another vehicle

Using a fake ID to enter a bar

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

How can impersonation on social networks be used to manipulate individuals?

By using emojis in messages to build rapport

By sending friend requests to gather personal data

By creating fake events to lure individuals

By gaining trust through fake accounts, spreading misinformation, phishing for personal information, or engaging in social engineering tactics.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the main goal of a phishing attack?

To deceive individuals into providing sensitive information

To educate individuals on online safety

To provide accurate information to individuals

To enhance cybersecurity measures

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

How can social media manipulation be used to spread misinformation?

By promoting fact-checking and accuracy

By collaborating with reputable sources

By creating fake accounts, using bots, manipulating algorithms, and exploiting echo chambers.

By encouraging critical thinking and skepticism

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?