Social Engineering

Social Engineering

8th Grade

9 Qs

quiz-placeholder

Similar activities

Ciberseguridad

Ciberseguridad

8th Grade

15 Qs

Online Safety

Online Safety

6th - 12th Grade

11 Qs

Intro Types of Software

Intro Types of Software

7th - 8th Grade

6 Qs

Revision Quiz 2 - Information Technology

Revision Quiz 2 - Information Technology

7th - 8th Grade

10 Qs

computer quiz 1

computer quiz 1

3rd - 10th Grade

15 Qs

Software

Software

KG - Professional Development

15 Qs

Computer Studies

Computer Studies

8th Grade

15 Qs

Basic Computer Terms

Basic Computer Terms

8th Grade

7 Qs

Social Engineering

Social Engineering

Assessment

Interactive Video

Computers

8th Grade

Hard

Created by

Jack Walker

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who is often the weakest link in security systems?

The hacker

The antivirus software

The internet service provider

The user

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is pretexting in the context of cyber security?

A method used by scammers to initiate scams

A type of computer virus

A firewall technology

A secure way to share passwords

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common tactic used by scammers during pretexting?

Sending spam emails

Using a pre-prepared script

Offering free software

Physical theft

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do if you receive a suspicious email from your bank?

Ignore the email completely

Reply with your account details

Click on the link provided

Manually type the bank's URL into your browser

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can phishing attacks be prevented?

By using a simple password

By sharing less on social media

By installing antivirus software with anti-phishing modules

By avoiding the use of email

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was demonstrated by the Trojan Horse experiment?

The effectiveness of antivirus software

How easily people can be tricked into clicking malicious links

The importance of strong passwords

The reliability of email filters

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do with files received from unknown sources?

Share them with friends

Delete them without checking

Scan them with antivirus software

Open them immediately

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the video, what remains constant despite technological evolution?

The speed of internet connections

The effectiveness of security measures

People's vulnerability to being fooled

The complexity of scams

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary reason people are vulnerable to scams, according to the video?

Lack of antivirus software

Use of outdated technology

Failure to update software

Inherent trust in others