
Social Engineering & Access Control Quiz
Authored by BYRONELLE WILLIAMS
Information Technology (IT)
11th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can users defend against watering hole attacks?
By installing anti-virus and anti-malware programs.
By avoiding common websites frequented by many users.
By relying on browser extensions to detect malicious URLs.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes phishing?
Fishing for compliments on social media
Attempting to gain sensitive information through electronic communication by posing as a trustworthy source
Using real fishing as a metaphor for online security
Sending out random emails without a specific target
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common characteristic of obvious phishing attempts?
Proper grammar and spelling
Well-designed graphics and fonts
Misspelled words and odd graphics
Promises that seem too good to be true
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is another term for phishing done by phone call or voice message?
Voice Broadcasting
Voice Messaging
Vishing
Audio Phishing
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is whaling in the context of phishing?
Phishing attempt directed at high-profile targets like CEOs
Phishing attempt directed at low-profile individuals
Phishing attempt using cloned email addresses
Phishing attempt through voice messages
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is social engineering?
A form of psychological manipulation to gain access to sensitive information or perform unauthorized actions
A technique used by hackers to exploit software vulnerabilities
A physical intrusion into a secure facility
A marketing strategy to promote products on social media
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can individuals defend against social engineering attacks?
By complying with all requests received via email
By ignoring any communication from unknown sources
By sharing personal information freely
By using the same password for all accounts
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?