Study Guide: Unit 2 - Social Engineering & Access Control

Study Guide: Unit 2 - Social Engineering & Access Control

11th Grade

47 Qs

quiz-placeholder

Similar activities

Latihan UNBK TKJ 2019

Latihan UNBK TKJ 2019

10th Grade - University

50 Qs

#2 CIW Data Analyst - Certification Prep

#2 CIW Data Analyst - Certification Prep

9th Grade - University

54 Qs

ÔN TẬP GIỮA KÌ 1 TIN 8 NĂM HỌC 2025-2026

ÔN TẬP GIỮA KÌ 1 TIN 8 NĂM HỌC 2025-2026

8th Grade - University

47 Qs

iMedia R093 Mix Up#2

iMedia R093 Mix Up#2

9th - 12th Grade

45 Qs

VoIP - Teknologi Layanan Jaringan

VoIP - Teknologi Layanan Jaringan

11th Grade

50 Qs

Solon Microsoft Excel Quiz

Solon Microsoft Excel Quiz

9th - 12th Grade

50 Qs

AQA 8525 GCSE CS 3.2.10 Subroutines & 3.2.11 Robust & Secure

AQA 8525 GCSE CS 3.2.10 Subroutines & 3.2.11 Robust & Secure

10th - 11th Grade

50 Qs

2425_ÔN TẬP TIN HỌC 9

2425_ÔN TẬP TIN HỌC 9

9th Grade - University

54 Qs

Study Guide: Unit 2 - Social Engineering & Access Control

Study Guide: Unit 2 - Social Engineering & Access Control

Assessment

Quiz

Computers

11th Grade

Easy

Created by

Victoria Berkowitz

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

47 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is social engineering?

A. A form of psychological manipulation to gain access to sensitive information or perform unauthorized actions

B. A technique used by hackers to exploit software vulnerabilities

C. A physical intrusion into a secure facility

D. A marketing strategy to promote products on social media

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a method through which social engineering can be executed?

A. Texting

B. Face to face communication

C. Email

D. All the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are biases in the context of social engineering?

A. Preconceived notions that influence decision making

B. Encrypted messages sent by attackers

C. Passwords used to gain unauthorized access

D. Fake identities used in phishing attacks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which principle of social engineering exploits a bias of obedience and compliance?

A. Intimidation

B. Consensus/social proof

C. Authority

D. Trust

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the principle of scarcity in social engineering?

A. The fear of consequences

B. The desire to have access for exlusive items

C. The tendency to follow the crowd

D. The exploitation of a bias of relationship

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can individuals defend against social engineering attacks?

A. By complying with all requests received via email

B. By ignoring any communication from unknown sources

C. By recognizing when manipulation techniques are being used

D. By sharing personal information freely to avoid conflict

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a clue to a potential social engineering attack in email communication?

A. "Act now"

B. "Supplies are limited"

C. "Congratulations, you've won!"

D. "Take your time to consider"

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?