Search Header Logo

Social Engineering & Access Control Quiz

Authored by BYRONELLE WILLIAMS

Information Technology (IT)

11th Grade

Used 2+ times

Social Engineering & Access Control Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can users defend against watering hole attacks?

By installing anti-virus and anti-malware programs.

By avoiding common websites frequented by many users.

By relying on browser extensions to detect malicious URLs.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes phishing?

Fishing for compliments on social media

Attempting to gain sensitive information through electronic communication by posing as a trustworthy source

Using real fishing as a metaphor for online security

Sending out random emails without a specific target

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common characteristic of obvious phishing attempts?

Proper grammar and spelling

Well-designed graphics and fonts

Misspelled words and odd graphics

Promises that seem too good to be true

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is another term for phishing done by phone call or voice message?

Voice Broadcasting

Voice Messaging

Vishing

Audio Phishing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is whaling in the context of phishing?

Phishing attempt directed at high-profile targets like CEOs

Phishing attempt directed at low-profile individuals

Phishing attempt using cloned email addresses

Phishing attempt through voice messages

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is social engineering?

A form of psychological manipulation to gain access to sensitive information or perform unauthorized actions

A technique used by hackers to exploit software vulnerabilities

A physical intrusion into a secure facility

A marketing strategy to promote products on social media

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can individuals defend against social engineering attacks?

By complying with all requests received via email

By ignoring any communication from unknown sources

By sharing personal information freely

By using the same password for all accounts

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?