Cyber security

Cyber security

12th Grade

13 Qs

quiz-placeholder

Similar activities

Present perfect Vs. Present Perfect Continuous

Present perfect Vs. Present Perfect Continuous

8th Grade - Professional Development

12 Qs

ÔN THI KÌ 2 LỚP 12

ÔN THI KÌ 2 LỚP 12

12th Grade

15 Qs

The social Dilemma

The social Dilemma

12th Grade

8 Qs

Tuần 14- Quiz 1

Tuần 14- Quiz 1

12th Grade

10 Qs

homelife

homelife

10th - 12th Grade

12 Qs

Write Wisely

Write Wisely

7th - 12th Grade

14 Qs

SHORT COMMUNICATIVE MESSAGE COMPREHENSION QUESTIONS

SHORT COMMUNICATIVE MESSAGE COMPREHENSION QUESTIONS

12th Grade

11 Qs

Eng 12 - Vocabulary 2, chapter 10

Eng 12 - Vocabulary 2, chapter 10

12th Grade

10 Qs

Cyber security

Cyber security

Assessment

Quiz

English

12th Grade

Practice Problem

Hard

CCSS
L.11-12.6, L.9-10.6, W.11-12.2D

+2

Standards-aligned

Created by

Lovisa Bylund

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 2 pts

What is social engineering primarily concerned with?

Hacking into networks

Exploiting technological weaknesses

Manipulation human behavior

Creating malware

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is an example of baiting?

A phone call from a bank

A USB stick loaded with malware

An email asking for personal information

A fake social media account

3.

MULTIPLE CHOICE QUESTION

20 sec • 2 pts

What does phising typically involve?

Using malware to access data

Pysical intrusion into a building

Creating fake websites for transactions

Sending fake emails to obtain information

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is vising?

Phising through social media

Phising through voice calls

Phising through SMS

Phising through emails

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What should you do if you receive a suspicious email?

Check the source and verify

Ignore it completely

Click on the links to verify

Forward it to your friends

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a common tactic used in social engineering attacks?

Using complex passwords

Providing detailed information

Creating a sense of urgency

Offering free software

7.

MULTIPLE CHOICE QUESTION

10 sec • 5 pts

How can you protect your devices from social engineering attacks?

Share personal information freely

Use the same password for all accounts

Keep software and firmware updated

Disable spam filters

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?