Cyber EOP - Social Engineering Attacks By Mr. B

Cyber EOP - Social Engineering Attacks By Mr. B

12th Grade

18 Qs

quiz-placeholder

Similar activities

2.8 Social Engineering 5

2.8 Social Engineering 5

12th Grade

23 Qs

Ancaman Siber dan Keamanannya

Ancaman Siber dan Keamanannya

12th Grade

15 Qs

Unit 2 -Cyber

Unit 2 -Cyber

9th - 12th Grade

15 Qs

Security Threats

Security Threats

10th Grade - University

20 Qs

Cyber Security

Cyber Security

9th - 12th Grade

20 Qs

Social Engineering Attacks

Social Engineering Attacks

9th - 12th Grade

17 Qs

OCR IT. Unit 3 - Cyber Security. LO2 test:

OCR IT. Unit 3 - Cyber Security. LO2 test:

11th - 12th Grade

20 Qs

Hackers & Cyber Attacks

Hackers & Cyber Attacks

12th Grade

21 Qs

Cyber EOP - Social Engineering Attacks By Mr. B

Cyber EOP - Social Engineering Attacks By Mr. B

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Cyber Professor - Mr. B

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

What is the most common type of social engineering attack?

Tailgating

Phishing

Whaling

Baiting

Answer explanation

Phishing is the most common social engineering attack, where attackers deceive individuals into providing sensitive information, often through fake emails or websites. It targets a wide audience, making it prevalent.

2.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

Which type of phishing specifically targets high-level executives?

Spear phishing

Whaling

SMS phishing

Angler phishing

Answer explanation

Whaling is a type of phishing that specifically targets high-level executives, making it distinct from other forms like spear phishing, which targets individuals, or SMS and angler phishing, which use different methods.

3.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

What is a common tactic used in baiting attacks?

Spoofing email addresses

Creating a false sense of urgency

Following someone into a secure area

Offering free gifts

Answer explanation

Offering free gifts is a common tactic in baiting attacks, as it entices individuals to engage without suspicion, making them more likely to fall for the scam.

4.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

In a honey trap attack, what does the attacker pretend to be?

A delivery driver

An IRS auditor

A customer service representative

A romantic interest

Answer explanation

In a honey trap attack, the attacker pretends to be a romantic interest to manipulate the target emotionally and gain sensitive information. This tactic exploits personal relationships for malicious purposes.

5.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

What is the goal of pretexting in social engineering?

To impersonate a delivery driver

To install malware

To create a fake scenario to gain information

To steal physical items

Answer explanation

The goal of pretexting in social engineering is to create a fake scenario to gain information. This technique involves fabricating a story or identity to manipulate the target into revealing sensitive data.

6.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

What does SMS phishing often spoof?

Multi-factor authentication requests

Email addresses

Delivery notifications

Social media accounts

Answer explanation

SMS phishing often targets multi-factor authentication requests, tricking users into providing sensitive information by pretending to be legitimate verification messages from trusted services.

7.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

What is scareware designed to do?

Redirect to phishing sites

Steal login credentials

Create pop-up alerts about fake viruses

Install real viruses

Answer explanation

Scareware is designed to create pop-up alerts about fake viruses, tricking users into believing their system is infected. This tactic aims to scare users into purchasing unnecessary software or services.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?