Unit 2

Unit 2

12th Grade

14 Qs

quiz-placeholder

Similar activities

M2 Social Engineering, Camb Nats

M2 Social Engineering, Camb Nats

9th - 12th Grade

12 Qs

Social Engineering Game

Social Engineering Game

9th - 12th Grade

12 Qs

Unit 2 Cybersecurity Review

Unit 2 Cybersecurity Review

9th - 12th Grade

14 Qs

CamTech Network Security

CamTech Network Security

8th - 12th Grade

12 Qs

A+ 1002 Chapter 4 Review

A+ 1002 Chapter 4 Review

7th - 12th Grade

15 Qs

Malware and Attack Technologies

Malware and Attack Technologies

9th - 12th Grade

12 Qs

IT Security Threats

IT Security Threats

10th - 12th Grade

11 Qs

Computer Security Risk

Computer Security Risk

12th Grade - University

16 Qs

Unit 2

Unit 2

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Michael Curran

Used 9+ times

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which two of the following steps of hacking are most likely to involve the use of social engineering? (pick 2)
Recon / footprinting Gaining Access
Scanning / Probing
Escalating Privileges
Exploiting
Covering Tracks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the goal of social engineering?
To get an authorized user to give information to an unauthorized person
To make people behave better
To help people make more friends
To have an unauthorized user to determine a user's password using brute force

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main method used in social engineering?
Deception
Brute Force
Complex Algorithms
Ransom attacks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is NOT a reason that Social Engineering is so successful?
Humans are good at problem solving
Humans want to avoid confrontation
Humans make sloppy mistakes
Humans want to be helpful

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following Social Engineering techniques are best protected against by use of a security guard or turnstile?
Piggybacking
Shoulder Surfing
Dumpster Diving
Baiting

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This is considered the single biggest threat in the digital world and was used in 67% of cyber attacks last year?
Phishing
Shoulder Surfing
Piggybacking
Dumpster Diving

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT an indication that the email might be a phishing email?
Email was sent in the middle of the night
URL doesn't match the text
Misspellings
Sender and email address don't match

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?