Study Guide: Unit 2 - Social Engineering & Access Control

Study Guide: Unit 2 - Social Engineering & Access Control

11th Grade

47 Qs

quiz-placeholder

Similar activities

K11 - Giữa HK II - CS Cánh diều

K11 - Giữa HK II - CS Cánh diều

11th Grade

55 Qs

SUMATIF AKHIR SEMESTER KELAS VII

SUMATIF AKHIR SEMESTER KELAS VII

7th Grade - University

50 Qs

Pengalamatan Jaringan

Pengalamatan Jaringan

11th Grade

50 Qs

Ulangan Harian Bab V TIK Kelas XI

Ulangan Harian Bab V TIK Kelas XI

11th Grade

50 Qs

SP- Level 2

SP- Level 2

5th Grade - Professional Development

50 Qs

9.2 Homework 4

9.2 Homework 4

9th - 12th Grade

46 Qs

Intro To Networking 123

Intro To Networking 123

9th - 12th Grade

53 Qs

kuis  Jaringan Internet

kuis Jaringan Internet

9th Grade - University

50 Qs

Study Guide: Unit 2 - Social Engineering & Access Control

Study Guide: Unit 2 - Social Engineering & Access Control

Assessment

Quiz

Computers

11th Grade

Easy

Created by

Victoria Berkowitz

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

47 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is social engineering?

A. A form of psychological manipulation to gain access to sensitive information or perform unauthorized actions

B. A technique used by hackers to exploit software vulnerabilities

C. A physical intrusion into a secure facility

D. A marketing strategy to promote products on social media

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a method through which social engineering can be executed?

A. Texting

B. Face to face communication

C. Email

D. All the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are biases in the context of social engineering?

A. Preconceived notions that influence decision making

B. Encrypted messages sent by attackers

C. Passwords used to gain unauthorized access

D. Fake identities used in phishing attacks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which principle of social engineering exploits a bias of obedience and compliance?

A. Intimidation

B. Consensus/social proof

C. Authority

D. Trust

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the principle of scarcity in social engineering?

A. The fear of consequences

B. The desire to have access for exlusive items

C. The tendency to follow the crowd

D. The exploitation of a bias of relationship

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can individuals defend against social engineering attacks?

A. By complying with all requests received via email

B. By ignoring any communication from unknown sources

C. By recognizing when manipulation techniques are being used

D. By sharing personal information freely to avoid conflict

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a clue to a potential social engineering attack in email communication?

A. "Act now"

B. "Supplies are limited"

C. "Congratulations, you've won!"

D. "Take your time to consider"

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?