Social engineering

Social engineering

University

6 Qs

quiz-placeholder

Similar activities

Understanding Web Development Stacks

Understanding Web Development Stacks

11th Grade - University

8 Qs

Blockly Programming Quiz [Level 1A]

Blockly Programming Quiz [Level 1A]

7th Grade - University

10 Qs

Sem 2 IT Test 1

Sem 2 IT Test 1

12th Grade - University

10 Qs

Soal Pilihan Ganda Berpikir Komputasional

Soal Pilihan Ganda Berpikir Komputasional

10th Grade - University

11 Qs

QUIZ 3: SECURITY TOOLS and  VULNERABILITY ANALYSIS

QUIZ 3: SECURITY TOOLS and VULNERABILITY ANALYSIS

University

11 Qs

Production Line Group Work

Production Line Group Work

8th Grade - University

5 Qs

AI and Machine Learning Quiz

AI and Machine Learning Quiz

University

10 Qs

Mastering Microsoft OneDrive Basics

Mastering Microsoft OneDrive Basics

12th Grade - University

10 Qs

Social engineering

Social engineering

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

Nurbaini Zainuddin

Used 1+ times

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is social engineering?

A technique used to break computer hardware.

Manipulating people into giving confidential information.

A software used to hack passwords.

A tool used by cybersecurity experts.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a phishing attack?

A scammer pretending to be IT support to ask for login credentials.

A hacker breaking into a computer using a virus.

A pop-up ad for a free software download.

A strong password being leaked online.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You find a free USB drive labeled "Confidential Files" in the office. What should you do?

Plug it into your computer to check its contents.

Give it to your friend to see what’s inside.

Hand it over to IT or security.

Use it to store your own files.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a common social engineering attack?

Phishing

Tailgating

Firewall Hacking

Baiting

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do if you receive a suspicious email asking for your password?

Reply and ask for more details.

Click on the link to check if it’s real.

Ignore it and delete it.

Verify the sender’s identity through a different method (e.g., calling IT support).

6.

OPEN ENDED QUESTION

3 mins • 1 pt

You receive a call from someone claiming to be your bank, asking for your account details to “fix a security issue.” What should you do?

Evaluate responses using AI:

OFF