Unit 2 Cybersecurity Review

Unit 2 Cybersecurity Review

9th - 12th Grade

14 Qs

quiz-placeholder

Similar activities

Computer Security Risk

Computer Security Risk

11th Grade - University

16 Qs

Cybersecurity vocab :)

Cybersecurity vocab :)

1st Grade - Professional Development

15 Qs

Unit 2 -Cyber

Unit 2 -Cyber

9th - 12th Grade

15 Qs

Threats and Social Engineering

Threats and Social Engineering

9th - 10th Grade

10 Qs

Quiz - Garden State Cyber Unit 2.1

Quiz - Garden State Cyber Unit 2.1

9th - 12th Grade

9 Qs

Cybersecurity

Cybersecurity

9th - 11th Grade

14 Qs

Staying Safe on the Internet

Staying Safe on the Internet

10th - 12th Grade

10 Qs

Security Systems - Threats

Security Systems - Threats

10th Grade

14 Qs

Unit 2 Cybersecurity Review

Unit 2 Cybersecurity Review

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Michael Jakubowski

Used 8+ times

FREE Resource

14 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which two of the following steps of hacking are most likely to involve the use of social engineering? (pick 2)

Escalating Privileges

Recon / footprinting

Gaining Access

Exploiting

Scanning / Probing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the goal of social engineering?

To get an authorized user to give information to an unauthorized person

To make people behave better

To help people make more friends

To have an unauthorized user to determine a user's password using brute force

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main method used in social engineering?

Deception

Brute Force

Complex Algorithms

Ransom attacks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is NOT a reason that Social Engineering is so successful?

Humans are good at problem solving

Humans want to avoid confrontation

Humans make sloppy mistakes

Humans want to be helpful

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following Social Engineering techniques are best protected against by use of a security guard or turnstile?

Piggybacking

Shoulder Surfing

Dumpster Diving

Baiting

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This is considered the single biggest threat in the digital world and was used in 67% of cyber attacks last year?

Phishing

Shoulder Surfing

Piggybacking

Dumpster Diving

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT an indication that the email might be a phishing email?

Email was sent in the middle of the night

URL doesn't match the text

Misspellings

Sender and email address don't match

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?