Search Header Logo

Social Engineering Quiz

Authored by Vlad Tipu

Computers

10th Grade

Used 4+ times

Social Engineering Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing in the context of cyber security?

A method of strengthening email systems

A technique used to secure personal data

A type of attack where fraudulent emails are sent to steal sensitive information

A software tool used to detect viruses

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common tactic used in social media manipulation?

Posting accurate and verified information

Creating fake profiles to spread misinformation

Encouraging users to use strong passwords

Promoting digital literacy

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is pretexting in the context of social engineering?

Fixing bugs in software systems

Creating a fabricated scenario to obtain personal information

Installing antivirus software on computers

Using strong passwords to protect accounts

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of identity theft?

Borrowing a friend's book

Using someone else's password with permission

Impersonating someone else to gain access to their personal information

Sharing your own data on social media

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does tailgating involve in the context of security breaches?

Following closely behind another vehicle to save fuel

Attending informal gatherings in parking lots

Unauthorized individuals following authorized individuals into restricted areas

Sending emails from fake addresses

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Baiting in cyber security is similar to phishing except:

It involves offering something enticing to the victim

It only occurs via email

It is legal and ethically accepted

It does not involve stealing information

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which technique involves attackers disguising themselves as legitimate employees to gain physical access?

Phishing

Baiting

Tailgating

Pretexting

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?