14.5.2 - Quiz on Social Engineering Attacks

14.5.2 - Quiz on Social Engineering Attacks

10th Grade

15 Qs

quiz-placeholder

Similar activities

Internet Security

Internet Security

3rd - 10th Grade

19 Qs

L2 - Social Engineering  KS3

L2 - Social Engineering KS3

9th - 11th Grade

10 Qs

(L2) 1.4 Network Security

(L2) 1.4 Network Security

10th Grade

19 Qs

SQL Injection

SQL Injection

10th Grade

10 Qs

Malware

Malware

7th - 11th Grade

15 Qs

J808 4.1 Types of threats

J808 4.1 Types of threats

9th - 11th Grade

20 Qs

8.3 Security of data (1)

8.3 Security of data (1)

9th - 12th Grade

15 Qs

Password Hacking Techniques

Password Hacking Techniques

9th Grade - University

14 Qs

14.5.2 - Quiz on Social Engineering Attacks

14.5.2 - Quiz on Social Engineering Attacks

Assessment

Quiz

Computers

10th Grade

Easy

Created by

Brian Bass

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of a phishing attack?

To perform a denial of service attack

To gain physical access to a building

To send spam emails

To trick users into clicking malicious links

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a characteristic of spear phishing?

It is targeted and well-researched

It is a generic email

It targets a large number of people

It involves physical interaction

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an evil twin attack?

An attack that involves eavesdropping on conversations

An attack that involves sending phishing emails

An attack that uses a rogue access point to mimic a legitimate network

An attack that involves impersonating a legitimate user

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best defense against phishing attacks?

Installing antivirus software

Encrypting emails

User training

Using a firewall

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does tailgating involve?

Sending fake emails

Listening to private conversations

Following someone into a restricted area

Creating a fake website

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can users prevent tailgating?

By using privacy screens

By encrypting their data

By being aware of their surroundings

By using strong passwords

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main tactic used in vishing attacks?

Sending emails

Using high-pressure tactics over the phone

Creating fake websites

Physically following someone

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?