Lesson 3 - Social Engineering

Lesson 3 - Social Engineering

9th Grade

15 Qs

quiz-placeholder

Similar activities

Social Engineering Attacks

Social Engineering Attacks

9th - 12th Grade

17 Qs

J277 Network Threats

J277 Network Threats

7th - 11th Grade

10 Qs

Cyber Security - Year 9

Cyber Security - Year 9

1st - 9th Grade

12 Qs

Internet Security

Internet Security

3rd - 10th Grade

19 Qs

Cyber Security

Cyber Security

8th - 12th Grade

20 Qs

Y9 Hwk Quiz 1 (Social Engineering)

Y9 Hwk Quiz 1 (Social Engineering)

9th Grade

15 Qs

Lesson 10 - Threats to Data

Lesson 10 - Threats to Data

9th Grade

14 Qs

Cyber Security KS4

Cyber Security KS4

8th - 12th Grade

15 Qs

Lesson 3 - Social Engineering

Lesson 3 - Social Engineering

Assessment

Quiz

Computers

9th Grade

Hard

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Sending emails in an attempt to gain money or information from people due to a made up reason

Blagging

Phishing

Social Engineering

Virus

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

You get a phone call from someone pretending to be from microsoft, they ask for your log in details and password

Phishing

Blagging

Brute Force

Hacking

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A message has appeared on your screen asking you to pay money to an account otherwise your files will be deleted

Blagging

Ransomware

Trojan

Hacking

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

One of your workers has accidentally deleted some system files

Hacking

Trojan

Human Error

Blagging

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Making up a scenario to try and get information or money from someone

Phishing

Blagging

DDoS

Social Engineering

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Using someone's social media to either gather information or try to contact them

Blagging

Social Engineering

Hacking

Espionage

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following most closely matches the definition of 'Blagging'?

Sending an e-mail to a user pretending to be someone else

Hacking a person's computer

Tricking a person into revealing some personal information

Observing a legitimate user entering a password

Setting up a fake website that looks like an official website

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?