Social Engineering Unit Review

Social Engineering Unit Review

10th Grade

22 Qs

quiz-placeholder

Similar activities

PH SIMKMDIG KD 3.1 Menerapkan Logika dan Algoritma Komputer

PH SIMKMDIG KD 3.1 Menerapkan Logika dan Algoritma Komputer

1st - 10th Grade

20 Qs

Evaluación Primer Periodo Excel

Evaluación Primer Periodo Excel

10th Grade

20 Qs

ASESMEN FORMATIF BAB.1 KETERAMPILAN GENETRIK INFORMATIKA

ASESMEN FORMATIF BAB.1 KETERAMPILAN GENETRIK INFORMATIKA

10th Grade

20 Qs

business 1.4 revision

business 1.4 revision

KG - Professional Development

20 Qs

UNIT 1.2 MEMORY

UNIT 1.2 MEMORY

10th Grade

19 Qs

HTML QUIZ # 3

HTML QUIZ # 3

10th Grade

20 Qs

computer Lab Manners

computer Lab Manners

5th - 10th Grade

19 Qs

COMPRAR UNA LAPTOP

COMPRAR UNA LAPTOP

10th Grade

20 Qs

Social Engineering Unit Review

Social Engineering Unit Review

Assessment

Quiz

Computers

10th Grade

Practice Problem

Medium

Created by

Rob Breshears

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Which of the following is a cybercrime tactic used to deceive individuals into providing sensitive information like usernames and passwords?

Typosquatting

Phishing

Watering Hole Attack

Clickjacking

2.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

A social engineering principle where the attacker pretends to be a person of importance, like a police officer, is known as:

Scarcity

Urgency

Authority

Trust

3.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Exploiting a user's misspelling of a website, such as typing "facbook.com" instead of "facebook.com," is an example of what?

Whaling

Vishing

Smishing

Typosquatting

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

What type of phishing attack is directed at a high-profile target, such as a CEO?

Spear phishing

Whaling

Spam

Clone phishing

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Which of the following involves an attacker stealing the cookie used to authenticate a user on a website?

Session Hijacking

Credential Harvesting

Clickjacking

Business Email Compromise

6.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Intentionally spreading false information with the purpose of causing harm or confusion is known as:

Misinformation

A hoax

Disinformation

Impersonation

7.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

A "watering hole" attack is a metaphor for what?

Flooding a user's inbox with spam emails.

A place online that users frequently visit for information or resources.

A physical location where hackers gather.

An attack that uses a sense of urgency to trick victims.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers