Cybersecurity Units 2-4 Review

Cybersecurity Units 2-4 Review

9th - 12th Grade

85 Qs

quiz-placeholder

Similar activities

Test STEM English IT

Test STEM English IT

1st Grade - Professional Development

85 Qs

TIN 9 BÀI 3

TIN 9 BÀI 3

9th Grade

80 Qs

Unit 6:  Algorithms (APCSP '24-'25 code.org)

Unit 6: Algorithms (APCSP '24-'25 code.org)

9th - 12th Grade

85 Qs

J277 Paper 2 Computational Thinking, Programming and Algorithms

J277 Paper 2 Computational Thinking, Programming and Algorithms

9th - 10th Grade

90 Qs

Year 9 - End of Year Assessment

Year 9 - End of Year Assessment

7th - 9th Grade

85 Qs

Ôn tập KTCK2

Ôn tập KTCK2

12th Grade

88 Qs

2.2 Programming Fundamentals

2.2 Programming Fundamentals

10th Grade

86 Qs

EUTK - - praca na lekcji

EUTK - - praca na lekcji

1st Grade - University

90 Qs

Cybersecurity Units 2-4 Review

Cybersecurity Units 2-4 Review

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

Chanel Douglas

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

85 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A set of methods used by cyber criminals to deceive individuals into handing over information that they can use for fraudulent purposes’ is a definition of what?

Impersonatin

Shoulder Surfing

Phishing

Social Engineering

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is one way somebody could protect themselves from shoulder surfing?

share your pin with someone you trust

create a pin that is easy to remember

have a pin that is the same as your friends

be aware of who is around you

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

While waiting in the lobby of your building for a guest, you notice a man in a red shirt standing close to a locked door with a large box in his hands. He waits for someone else to come along and open the locked door and then proceeds to follow her inside. What type of social engineering attack have you just witnessed?

Impersonation

Phishing

Boxing

Tailgating

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

 A user in your organization contacts you to see if there’s any update to the “account compromise” that happened last week. When you ask him to explain what he means, and the user tells you he received a phone call earlier in the week from your department and was asked to verify his user ID and password. The user says he gave the caller his user ID and password. This user has fallen victim to what specific type of attack?

Spear phishing

Vishing

Phishing

Replication

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Coming into your office, you overhear a conversation between two security guards. One guard is telling the other she caught several people digging through the trash behind the building early this morning. The security guard says the people claimed to be looking for aluminum cans, but only had a bag of papers—no cans. What type of attack has this security guard witnessed?

Spear phishing

Pharming

Dumpster diving

Rolling refuse

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following is a type of social engineering attack in which an attacker attempts to obtain sensitive information from a user by masquerading as a trusted entity in an e-mail?

Phishing

Pharming

Spam

Vishing

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following is/are psychological tools used by social engineers to create false trust with a target?

Impersonation

Urgency or scarcity

Authority

All of the above

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?