G10 CS Sem 2 TA The Internet, AI, and Programming

G10 CS Sem 2 TA The Internet, AI, and Programming

10th Grade

21 Qs

quiz-placeholder

Similar activities

Y9 Social Engineering

Y9 Social Engineering

Unit 2 Test: Advanced Threats and Attack Techniques

Unit 2 Test: Advanced Threats and Attack Techniques

Cybersecurity Quiz

Cybersecurity Quiz

Internet security

Internet security

Understanding Social Engineering

Understanding Social Engineering

G10 CS Sem 2 TA The Internet, AI, and Programming

G10 CS Sem 2 TA The Internet, AI, and Programming

Assessment

Quiz

Computers

10th Grade

Practice Problem

Medium

Created by

Fritz Bansag

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

21 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Tick all selection that describe Social Engineering.

It is the manipulating, tricking, or deceiving people to obtain data

it forces to make error in giving sensitive information

Uses impersonation, pop-ups, phishing to get data

It collects information through civil engineering

are applications for socialization.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

is a cyber attack that redirects a website's traffic to another fake website by installing a malicious program on the victim's computer to gain access access it.

Pharming

Phishing

Vishing

Smishing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

is a malicious spoofing attempt to obtain sensitive information such as usernames, passwords and credit card details by masquerading as a fake owner.

Pharming

Phishing

Vishing

Smishing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Vishing

is a cyber attack that redirects a website's traffic to another fake website by installing a malicious program on the victim's computer to gain access access it.

is a malicious spoofing attempt to obtain sensitive information such as usernames, passwords and credit card details by masquerading as a fake owner.

refers to scams conducted through phone calls. This is like receiving a phishing email, except the attacker calls you directly with a recorded or in-person interaction instead of reaching out digitally

is a scam sent via text message to your phone instead of email to your inbox. The word comes from combining the words "SMS", meaning Short Message Service (text message) and "phishing".

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Phishing

is a cyber attack that redirects a website's traffic to another fake website by installing a malicious program on the victim's computer to gain access access it.

is a malicious spoofing attempt to obtain sensitive information such as usernames, passwords and credit card details by masquerading as a fake owner.

refers to scams conducted through phone calls. This is like receiving a phishing email, except the attacker calls you directly with a recorded or in-person interaction instead of reaching out digitally

is a scam sent via text message to your phone instead of email to your inbox. The word comes from combining the words "SMS", meaning Short Message Service (text message) and "phishing".

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Pharming

is a cyber attack that redirects a website's traffic to another fake website by installing a malicious program on the victim's computer to gain access access it.

is a malicious spoofing attempt to obtain sensitive information such as usernames, passwords and credit card details by masquerading as a fake owner.

refers to scams conducted through phone calls. This is like receiving a phishing email, except the attacker calls you directly with a recorded or in-person interaction instead of reaching out digitally

is a scam sent via text message to your phone instead of email to your inbox. The word comes from combining the words "SMS", meaning Short Message Service (text message) and "phishing".

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Tick solutions to prevent pharming

Use secure and updated antivirus software, regularly update operating systems and software, implement DNS security measures, and educate users about phishing scams.

Check the spelling and tone of the email/website

Click on links that are very interesting from cold email

Never provide personal details online

Install firewall to check if the website is valid

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?