14.5.2 - Quiz on Social Engineering Attacks

14.5.2 - Quiz on Social Engineering Attacks

10th Grade

15 Qs

quiz-placeholder

Similar activities

Risks to Data and Information

Risks to Data and Information

9th - 10th Grade

10 Qs

Security risk (Grade 11 IGCSE)

Security risk (Grade 11 IGCSE)

10th - 11th Grade

14 Qs

Data Security

Data Security

5th - 10th Grade

10 Qs

Security Threats

Security Threats

10th Grade - University

20 Qs

2 - Cybersecurity 101

2 - Cybersecurity 101

9th Grade - University

20 Qs

08 - Protecting Yourself QUIZ

08 - Protecting Yourself QUIZ

9th - 12th Grade

17 Qs

Ethical, Legal and Social Issues of Computing

Ethical, Legal and Social Issues of Computing

9th - 11th Grade

20 Qs

Cyber Security

Cyber Security

9th - 12th Grade

20 Qs

14.5.2 - Quiz on Social Engineering Attacks

14.5.2 - Quiz on Social Engineering Attacks

Assessment

Quiz

Computers

10th Grade

Easy

Created by

Brian Bass

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of a phishing attack?

To perform a denial of service attack

To gain physical access to a building

To send spam emails

To trick users into clicking malicious links

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a characteristic of spear phishing?

It is targeted and well-researched

It is a generic email

It targets a large number of people

It involves physical interaction

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an evil twin attack?

An attack that involves eavesdropping on conversations

An attack that involves sending phishing emails

An attack that uses a rogue access point to mimic a legitimate network

An attack that involves impersonating a legitimate user

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best defense against phishing attacks?

Installing antivirus software

Encrypting emails

User training

Using a firewall

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does tailgating involve?

Sending fake emails

Listening to private conversations

Following someone into a restricted area

Creating a fake website

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can users prevent tailgating?

By using privacy screens

By encrypting their data

By being aware of their surroundings

By using strong passwords

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main tactic used in vishing attacks?

Sending emails

Using high-pressure tactics over the phone

Creating fake websites

Physically following someone

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?