Social Engineering

Social Engineering

8th Grade

9 Qs

quiz-placeholder

Similar activities

Revision -yr 8

Revision -yr 8

8th Grade

14 Qs

Securitate Cibernetica

Securitate Cibernetica

1st - 10th Grade

11 Qs

S1 ICT Internet Safety

S1 ICT Internet Safety

8th Grade

12 Qs

Cyber security quizlet

Cyber security quizlet

8th - 9th Grade

10 Qs

Parts of a Computer (Grades 3-5)

Parts of a Computer (Grades 3-5)

4th - 8th Grade

12 Qs

phishing

phishing

8th - 9th Grade

10 Qs

Safe Computing & Web Browser Review

Safe Computing & Web Browser Review

6th - 8th Grade

15 Qs

Malware Review

Malware Review

6th - 8th Grade

11 Qs

Social Engineering

Social Engineering

Assessment

Interactive Video

Computers

8th Grade

Hard

Created by

Jack Walker

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who is often the weakest link in security systems?

The hacker

The antivirus software

The internet service provider

The user

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is pretexting in the context of cyber security?

A method used by scammers to initiate scams

A type of computer virus

A firewall technology

A secure way to share passwords

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common tactic used by scammers during pretexting?

Sending spam emails

Using a pre-prepared script

Offering free software

Physical theft

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do if you receive a suspicious email from your bank?

Ignore the email completely

Reply with your account details

Click on the link provided

Manually type the bank's URL into your browser

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can phishing attacks be prevented?

By using a simple password

By sharing less on social media

By installing antivirus software with anti-phishing modules

By avoiding the use of email

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was demonstrated by the Trojan Horse experiment?

The effectiveness of antivirus software

How easily people can be tricked into clicking malicious links

The importance of strong passwords

The reliability of email filters

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do with files received from unknown sources?

Share them with friends

Delete them without checking

Scan them with antivirus software

Open them immediately

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the video, what remains constant despite technological evolution?

The speed of internet connections

The effectiveness of security measures

People's vulnerability to being fooled

The complexity of scams

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary reason people are vulnerable to scams, according to the video?

Lack of antivirus software

Use of outdated technology

Failure to update software

Inherent trust in others