14.5.2 - Quiz on Social Engineering Attacks

14.5.2 - Quiz on Social Engineering Attacks

10th Grade

15 Qs

quiz-placeholder

Similar activities

Computer Threats Quiz

Computer Threats Quiz

10th Grade

20 Qs

Smishing Phishing Vishing Pharming

Smishing Phishing Vishing Pharming

10th Grade

14 Qs

Fundamentals of Cyber Security

Fundamentals of Cyber Security

10th Grade

15 Qs

Malware

Malware

7th - 11th Grade

15 Qs

EMAIL VOCABULARY

EMAIL VOCABULARY

7th - 12th Grade

16 Qs

Cyber Security

Cyber Security

10th Grade

13 Qs

19. Cybersecurity Social Engineering Threats Quiz

19. Cybersecurity Social Engineering Threats Quiz

9th - 12th Grade

11 Qs

Data Security

Data Security

9th - 10th Grade

15 Qs

14.5.2 - Quiz on Social Engineering Attacks

14.5.2 - Quiz on Social Engineering Attacks

Assessment

Quiz

Computers

10th Grade

Easy

Created by

Brian Bass

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of a phishing attack?

To perform a denial of service attack

To gain physical access to a building

To send spam emails

To trick users into clicking malicious links

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a characteristic of spear phishing?

It is targeted and well-researched

It is a generic email

It targets a large number of people

It involves physical interaction

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an evil twin attack?

An attack that involves eavesdropping on conversations

An attack that involves sending phishing emails

An attack that uses a rogue access point to mimic a legitimate network

An attack that involves impersonating a legitimate user

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best defense against phishing attacks?

Installing antivirus software

Encrypting emails

User training

Using a firewall

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does tailgating involve?

Sending fake emails

Listening to private conversations

Following someone into a restricted area

Creating a fake website

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can users prevent tailgating?

By using privacy screens

By encrypting their data

By being aware of their surroundings

By using strong passwords

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main tactic used in vishing attacks?

Sending emails

Using high-pressure tactics over the phone

Creating fake websites

Physically following someone

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?