Social Engineering Quiz

Social Engineering Quiz

10th Grade

10 Qs

quiz-placeholder

Similar activities

J277 1.4 Network Security Quiz (Threats)

J277 1.4 Network Security Quiz (Threats)

9th - 12th Grade

13 Qs

DETECTING AND PREVENTING CYBER SECURITY THREATS

DETECTING AND PREVENTING CYBER SECURITY THREATS

9th - 12th Grade

15 Qs

Data Security

Data Security

9th - 10th Grade

15 Qs

Computer Ethics and Security

Computer Ethics and Security

9th - 12th Grade

10 Qs

Network Security - Phishing & Social Engineering

Network Security - Phishing & Social Engineering

8th - 11th Grade

11 Qs

Studio - U3 - LO1-1.2 Types of Cyber Security incidents

Studio - U3 - LO1-1.2 Types of Cyber Security incidents

9th Grade - University

10 Qs

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

J277 1.4 Network Security Quiz (Forms of Attack)

J277 1.4 Network Security Quiz (Forms of Attack)

9th - 12th Grade

13 Qs

Social Engineering Quiz

Social Engineering Quiz

Assessment

Quiz

Computers

10th Grade

Easy

Created by

Vlad Tipu

Used 4+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing in the context of cyber security?

A method of strengthening email systems

A technique used to secure personal data

A type of attack where fraudulent emails are sent to steal sensitive information

A software tool used to detect viruses

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common tactic used in social media manipulation?

Posting accurate and verified information

Creating fake profiles to spread misinformation

Encouraging users to use strong passwords

Promoting digital literacy

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is pretexting in the context of social engineering?

Fixing bugs in software systems

Creating a fabricated scenario to obtain personal information

Installing antivirus software on computers

Using strong passwords to protect accounts

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of identity theft?

Borrowing a friend's book

Using someone else's password with permission

Impersonating someone else to gain access to their personal information

Sharing your own data on social media

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does tailgating involve in the context of security breaches?

Following closely behind another vehicle to save fuel

Attending informal gatherings in parking lots

Unauthorized individuals following authorized individuals into restricted areas

Sending emails from fake addresses

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Baiting in cyber security is similar to phishing except:

It involves offering something enticing to the victim

It only occurs via email

It is legal and ethically accepted

It does not involve stealing information

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which technique involves attackers disguising themselves as legitimate employees to gain physical access?

Phishing

Baiting

Tailgating

Pretexting

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?