Study

Study

Professional Development

24 Qs

quiz-placeholder

Similar activities

Part 4.2

Part 4.2

Professional Development

20 Qs

6.0 Security - CompTIA IT Fundamentals (ITF+) Security Quiz #1

6.0 Security - CompTIA IT Fundamentals (ITF+) Security Quiz #1

Professional Development

20 Qs

ARC Quiz 2

ARC Quiz 2

Professional Development

20 Qs

Cybersecurity Quiz for DCB Parents

Cybersecurity Quiz for DCB Parents

Professional Development

20 Qs

IT Security Awareness Quiz

IT Security Awareness Quiz

Professional Development

20 Qs

Cyber Security (Cyber security KS4 1-3)

Cyber Security (Cyber security KS4 1-3)

9th Grade - Professional Development

28 Qs

Chapter 3 Quiz

Chapter 3 Quiz

Professional Development

20 Qs

101-120

101-120

Professional Development

20 Qs

Study

Study

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Mya Macfarland

FREE Resource

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A social engineering technique whereby attackers under disguise of a legitimate request attempt to gain access to confidential information is commonly referred to as:

Phishing

Privilege escalation

Backdoor access

Shoulder surfing

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following answers refer to smishing? (Select 2 answers)

Social engineering technique

E-mail communication

Spam over Internet Telephony (SPIT)

Text messaging

Spam over Internet Messaging (SPIM)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The practice of using a telephone system to manipulate user into disclosing confidential information is known as:

Whaling

  • Spear phishing

Vishing

Pharming

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following terms is commonly used to describe an unsolicited advertising message?

Spyware

Adware

Malware

Spam

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of spam relies on text-based communication?

Vishing

SPIM

SPIT

Bluesnarfing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Phishing scams targeting a specific group of people are referred to as:

Vishing

Spear phishing

Spoofing

Whaling

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In computer security, the term "Dumpster diving" is used to describe a practice of sifting through trash for discarded documents containing sensitive data. Found documents containing names and surnames of the employees along with the information about positions held in the company and other data can be used to facilitate social engineering attacks. Having the documents shredded or incinerated before disposal makes dumpster diving less effective and mitigates the risk of social engineering attacks.

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?