Social Engineering Unit Review

Social Engineering Unit Review

10th Grade

22 Qs

quiz-placeholder

Similar activities

L3: Understanding Security Policies

L3: Understanding Security Policies

9th - 12th Grade

21 Qs

Geoffs Quiz

Geoffs Quiz

10th - 11th Grade

24 Qs

Cyber Security

Cyber Security

9th - 12th Grade

18 Qs

S2 Cyber Resilience and Internet Security

S2 Cyber Resilience and Internet Security

3rd - 11th Grade

20 Qs

Digital Media - Chapter 1

Digital Media - Chapter 1

9th - 12th Grade

20 Qs

Networks and Cyber Security Revision

Networks and Cyber Security Revision

9th - 10th Grade

25 Qs

Chapter 6: ICT Applications

Chapter 6: ICT Applications

7th - 11th Grade

18 Qs

Digital Citizenship Questions Only

Digital Citizenship Questions Only

4th Grade - University

19 Qs

Social Engineering Unit Review

Social Engineering Unit Review

Assessment

Quiz

Computers

10th Grade

Hard

Created by

Rob Breshears

FREE Resource

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Which of the following is a cybercrime tactic used to deceive individuals into providing sensitive information like usernames and passwords?

Typosquatting

Phishing

Watering Hole Attack

Clickjacking

2.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

A social engineering principle where the attacker pretends to be a person of importance, like a police officer, is known as:

Scarcity

Urgency

Authority

Trust

3.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Exploiting a user's misspelling of a website, such as typing "facbook.com" instead of "facebook.com," is an example of what?

Whaling

Vishing

Smishing

Typosquatting

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

What type of phishing attack is directed at a high-profile target, such as a CEO?

Spear phishing

Whaling

Spam

Clone phishing

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Which of the following involves an attacker stealing the cookie used to authenticate a user on a website?

Session Hijacking

Credential Harvesting

Clickjacking

Business Email Compromise

6.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Intentionally spreading false information with the purpose of causing harm or confusion is known as:

Misinformation

A hoax

Disinformation

Impersonation

7.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

A "watering hole" attack is a metaphor for what?

Flooding a user's inbox with spam emails.

A place online that users frequently visit for information or resources.

A physical location where hackers gather.

An attack that uses a sense of urgency to trick victims.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?