Understanding Social Engineering

Understanding Social Engineering

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

BTEC DIT C3 B1 - Threats to Data

BTEC DIT C3 B1 - Threats to Data

11th Grade

11 Qs

J277 1.4 Network Security Quiz (Threats)

J277 1.4 Network Security Quiz (Threats)

9th - 12th Grade

13 Qs

Ethical and Social Issues in ICT

Ethical and Social Issues in ICT

10th Grade

15 Qs

analisis data dan visualisasi data

analisis data dan visualisasi data

10th Grade

10 Qs

Computer Education Grade 3 Volume 4 Quiz

Computer Education Grade 3 Volume 4 Quiz

3rd Grade - University

10 Qs

Packet Switching and Encryption

Packet Switching and Encryption

10th - 12th Grade

11 Qs

Social media influencers

Social media influencers

6th - 12th Grade

10 Qs

Cyber Security Homework 1

Cyber Security Homework 1

7th - 9th Grade

15 Qs

Understanding Social Engineering

Understanding Social Engineering

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Medium

Created by

Steven Hahn

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does passive social engineering exploit?

Use of authority figures

Unintentional actions of others

Email scams

Direct interaction with users

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method is NOT a form of active social engineering?

Flattery

Shoulder surfing

Forgery

Bribery

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does 'vishing' involve?

Creating fake websites

Sending emails

Using phone calls

Looking over someone's shoulder

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of phishing?

To follow people into secure areas

To obtain sensitive information via fraudulent websites

To impersonate authority figures

To listen to private conversations

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which social engineering attack involves entering a building by following someone without consent?

Tailgating

Phishing

Pretexting

Dumpster diving

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common feature of a phishing scam?

Pretending to be a friend

Offering a limited-time deal

Using a Rock Phish kit

Demanding immediate action

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of social engineering relies on the premise of friendship?

Scarcity

Reciprocity

Authority

Friendship

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?