Social Engineering Techniques

Social Engineering Techniques

12th Grade

10 Qs

quiz-placeholder

Similar activities

MILQ2 SUMMATIVE TEST 2

MILQ2 SUMMATIVE TEST 2

12th Grade

15 Qs

1.1.3 Email and Social Media Security Risk Quiz

1.1.3 Email and Social Media Security Risk Quiz

12th Grade

9 Qs

1.4 - Network Attacks

1.4 - Network Attacks

7th - 12th Grade

14 Qs

Higher Databases

Higher Databases

10th - 12th Grade

10 Qs

Test 5 - The Art of Integrity Review

Test 5 - The Art of Integrity Review

9th - 12th Grade

15 Qs

Detecting and Preventing Cyber Security Threats

Detecting and Preventing Cyber Security Threats

9th - 12th Grade

12 Qs

Technical Terms - Internet (A-Z) - ICF

Technical Terms - Internet (A-Z) - ICF

12th Grade

10 Qs

What is the Web? Modified - Review/Retake

What is the Web? Modified - Review/Retake

9th - 12th Grade

10 Qs

Social Engineering Techniques

Social Engineering Techniques

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Zayd .

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is a common method used in phishing attacks to trick individuals into providing sensitive information?

Deceptive emails

Fake websites

Bogus text messages

Phony phone calls

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

How can social media manipulation be used to deceive people?

By collaborating with fact-checking organizations

By sharing only verified information

By promoting critical thinking skills

By spreading false information, creating fake accounts, manipulating algorithms, and exploiting psychological vulnerabilities.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is an example of an impersonation technique used in social engineering?

Phishing

Spoofing

Vishing

Smishing

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is tailgating in the context of social engineering?

Unauthorized access to a restricted area by closely following an authorized person.

Sharing recipes at a social gathering

Driving too closely behind another vehicle

Using a fake ID to enter a bar

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

How can impersonation on social networks be used to manipulate individuals?

By using emojis in messages to build rapport

By sending friend requests to gather personal data

By creating fake events to lure individuals

By gaining trust through fake accounts, spreading misinformation, phishing for personal information, or engaging in social engineering tactics.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the main goal of a phishing attack?

To deceive individuals into providing sensitive information

To educate individuals on online safety

To provide accurate information to individuals

To enhance cybersecurity measures

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

How can social media manipulation be used to spread misinformation?

By promoting fact-checking and accuracy

By collaborating with reputable sources

By creating fake accounts, using bots, manipulating algorithms, and exploiting echo chambers.

By encouraging critical thinking and skepticism

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?