Cyber Security Unit 2 Exam

Cyber Security Unit 2 Exam

12th Grade

15 Qs

quiz-placeholder

Similar activities

G11 IT Security L2

G11 IT Security L2

12th Grade

10 Qs

Cyber Fun Password Attack Quiz

Cyber Fun Password Attack Quiz

9th Grade - University

20 Qs

Phishing quiz

Phishing quiz

1st - 12th Grade

20 Qs

Identity Theft

Identity Theft

8th - 12th Grade

12 Qs

social engineering

social engineering

1st Grade - Professional Development

10 Qs

Studio - U3 - LO1-1.2 Types of Cyber Security incidents

Studio - U3 - LO1-1.2 Types of Cyber Security incidents

9th Grade - University

10 Qs

Unit 1 LO5 Ethical and Operational Issues and Threats

Unit 1 LO5 Ethical and Operational Issues and Threats

12th Grade

15 Qs

Chapter 1: Getting Started with Digital Media

Chapter 1: Getting Started with Digital Media

12th Grade

19 Qs

Cyber Security Unit 2 Exam

Cyber Security Unit 2 Exam

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Peter Holey Jr

Used 25+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which two of the following steps of hacking are most likely to involve the use of social engineering? (Pick 2)

Reconnaissance

Scanning

Gaining Access

Maintaining Access

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the goal of social engineering?

To exploit software vulnerabilities

To manipulate individuals into divulging confidential information

To develop new hacking tools

To improve network security

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main method used in social engineering?

Brute force attacks

Phishing

SQL injection

Denial of Service

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is NOT a reason that Social Engineering is so successful?

It exploits human psychology

It uses complex algorithms

It often appears legitimate

It preys on trust

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following Social Engineering techniques are best protected against by use of a security guard or turnstile?

Phishing

Tailgating

Baiting

Pretexting

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This is considered the single biggest threat in the digital world and was used in 67% of cyber attacks last year?

Malware

Social Engineering

Ransomware

Phishing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT an indication that the email might be a phishing email?

Unfamiliar sender

Spelling errors

Personalized greeting

Urgent request for information

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?