
Social Engineering
Authored by Vasaka Visoottiviseth
Computers
University
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
6 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which attack type uses the tactic "something for something" to request sensitive info in return of a desirable service?
Pretexting
BEC
Quishing
Quid Pro Quo
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which attack type that the hackers closely monitors the executive’s behavior and poses as that executive who is authorized to deal with financial matters?
Smishing
Scareware
Baiting
BEC
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which attack type that the hacker may impersonate as a LINE man and follow a staff to enter the office entrance?
Honeytrap
Pretexting
Tailgating
Diversion Theft
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which attack type that involves creating a fabricated story to manipulate the victim into providing sensitive information?
Honeytrap
Pretexting
Diversion Theft
Impersonation
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which attack type that where the attacker creates a situation in which the victim believes they need help and reaches out to the attacker for assistance?
Reverse Social Engineering
Impersonation
Prompt Injection
Tailgating
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which attack type that the malicious actor steals confidential information by tricking the user into sending it to the wrong recipient?
Dumpster Diving
Vishing
Phishing
Diversion Theft
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?