Understanding Social Engineering Techniques

Understanding Social Engineering Techniques

Assessment

Interactive Video

Computers, Business, Life Skills

9th - 12th Grade

Hard

Created by

Mia Campbell

FREE Resource

The video explores social engineering, focusing on three skills: reconnaissance, dumpster diving, and shoulder surfing. It highlights how these skills can be used to gather information and the potential risks they pose. The video also provides tips on how to protect oneself and one's company from such attacks, emphasizing the importance of awareness and education.

Read more

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary focus of social engineering as discussed in the video?

Improving network security

Developing new software

Manipulating the human mind

Hacking computer systems

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first step in a social engineering attack according to the video?

Dumpster diving

Reconnaissance

Shoulder surfing

Phishing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which platform is NOT mentioned as a source for gathering information during recon?

Facebook

Twitter

Instagram

LinkedIn

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a potential risk of sharing too much information on LinkedIn?

Receiving spam emails

Getting unwanted friend requests

Being targeted by hackers

Losing job opportunities

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of dumpster diving in social engineering?

To gather sensitive information

To locate valuable items

To dispose of waste securely

To find recyclable materials

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should companies do to protect sensitive documents from dumpster diving?

Use a secure trash bin

Burn all documents

Shred documents before disposal

Throw them away in public bins

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is shoulder surfing?

A method to surf the internet

Observing someone’s screen over their shoulder

A way to protect personal information

A technique to hack into networks

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?