Search Header Logo

Social Engineering

Authored by Vasaka Visoottiviseth

Computers

University

Used 6+ times

Social Engineering
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack type uses the tactic "something for something" to request sensitive info in return of a desirable service?

Pretexting

BEC

Quishing

Quid Pro Quo

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which attack type that the hackers closely monitors the executive’s behavior and poses as that executive who is authorized to deal with financial matters?

Smishing

Scareware

Baiting

BEC

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack type that the hacker may impersonate as a LINE man and follow a staff to enter the office entrance?

Honeytrap

Pretexting

Tailgating

Diversion Theft

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack type that involves creating a fabricated story to manipulate the victim into providing sensitive information?

Honeytrap

Pretexting

Diversion Theft

Impersonation

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack type that where the attacker creates a situation in which the victim believes they need help and reaches out to the attacker for assistance?

Reverse Social Engineering

Impersonation

Prompt Injection

Tailgating

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack type that the malicious actor steals confidential information by tricking the user into sending it to the wrong recipient?

Dumpster Diving

Vishing

Phishing

Diversion Theft

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers