Cybersecurity EOY FInal Exam Review

Cybersecurity EOY FInal Exam Review

9th - 12th Grade

250 Qs

quiz-placeholder

Similar activities

Ulangan Administrasi Sistem Jaringan

Ulangan Administrasi Sistem Jaringan

11th - 12th Grade

245 Qs

Exploring Arduino Fundamentals

Exploring Arduino Fundamentals

11th Grade

253 Qs

Cybersecurity EOY FInal Exam Review

Cybersecurity EOY FInal Exam Review

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Computer Science, IGCSE Computer Science

Standards-aligned

Created by

Chanel Douglas

Used 1+ times

FREE Resource

250 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A set of methods used by cyber criminals to deceive individuals into handing over information that they can use for fraudulent purposes’ is a definition of what?

Impersonatin

Shoulder Surfing

Phishing

Social Engineering

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is one way somebody could protect themselves from shoulder surfing?

share your pin with someone you trust

create a pin that is easy to remember

have a pin that is the same as your friends

be aware of who is around you

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

While waiting in the lobby of your building for a guest, you notice a man in a red shirt standing close to a locked door with a large box in his hands. He waits for someone else to come along and open the locked door and then proceeds to follow her inside. What type of social engineering attack have you just witnessed?

Impersonation

Phishing

Boxing

Tailgating

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

 A user in your organization contacts you to see if there’s any update to the “account compromise” that happened last week. When you ask him to explain what he means, and the user tells you he received a phone call earlier in the week from your department and was asked to verify his user ID and password. The user says he gave the caller his user ID and password. This user has fallen victim to what specific type of attack?

Spear phishing

Vishing

Phishing

Replication

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Coming into your office, you overhear a conversation between two security guards. One guard is telling the other she caught several people digging through the trash behind the building early this morning. The security guard says the people claimed to be looking for aluminum cans, but only had a bag of papers—no cans. What type of attack has this security guard witnessed?

Spear phishing

Pharming

Dumpster diving

Rolling refuse

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following is a type of social engineering attack in which an attacker attempts to obtain sensitive information from a user by masquerading as a trusted entity in an e-mail?

Phishing

Pharming

Spam

Vishing

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following is/are psychological tools used by social engineers to create false trust with a target?

Impersonation

Urgency or scarcity

Authority

All of the above

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?