Understanding Social Engineering Threats

Understanding Social Engineering Threats

7th Grade

8 Qs

quiz-placeholder

Similar activities

Year 8 Methods of Attack and Hacking

Year 8 Methods of Attack and Hacking

6th - 8th Grade

13 Qs

Data Protection

Data Protection

KG - 12th Grade

10 Qs

Cybersecurity Quiz

Cybersecurity Quiz

6th - 8th Grade

10 Qs

M1 L2 Cyber Security

M1 L2 Cyber Security

7th - 8th Grade

10 Qs

INTERNET SAFETY

INTERNET SAFETY

3rd - 9th Grade

10 Qs

Don't Feed the Phish (Common Sense Media Quiz)

Don't Feed the Phish (Common Sense Media Quiz)

6th - 7th Grade

9 Qs

Understanding Fake News and Misinformation

Understanding Fake News and Misinformation

6th Grade - University

10 Qs

Online Privacy and Security

Online Privacy and Security

7th Grade

12 Qs

Understanding Social Engineering Threats

Understanding Social Engineering Threats

Assessment

Quiz

Computers

7th Grade

Medium

Created by

Connor KELLY

Used 5+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is a common sign of a phishing email?

It contains a personalised greeting.

It asks for your password or personal information.

It is sent from a known contact.

It has no spelling mistakes.

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following is a risk associated with social media?

Sharing your favourite music.

Posting your holiday plans publicly.

Liking a friend's photo.

Following a celebrity account.

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is a baiting attack?

An attack where a hacker uses a fake website to steal information.

An attack where a hacker leaves a USB drive in a public place to tempt someone to use it.

An attack where a hacker sends a fake email to get personal information.

An attack where a hacker calls pretending to be from a bank.

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is a tailgating incident in cyber security?

When someone follows you into a secure area without permission.

When someone hacks into your computer remotely.

When someone sends you a fake email.

When someone steals your password.

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is vishing?

Sending fake emails to steal information.

Making phone calls pretending to be someone else to steal information.

Sending text messages to steal information.

Creating fake websites to steal information.

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is smishing?

Sending fake emails to steal information.

Making phone calls pretending to be someone else to steal information.

Sending text messages to steal information.

Creating fake websites to steal information.

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is scareware?

Software that pretends to be a legitimate program but is actually harmful.

Software that scares you into thinking your computer is infected.

Software that protects your computer from viruses.

Software that speeds up your computer.

8.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following is a good practice to avoid social engineering attacks?

Sharing your passwords with friends.

Clicking on links from unknown sources.

Verifying the identity of the person asking for information.

Using the same password for all accounts.