Which two steps of hacking are most likely to involve the use of social engineering? Options: Scanning / Probing, Escalating Privileges, Exploiting, Recon / footprinting, Gaining Access
Unit 2 -Cyber

Flashcard
•
Computers
•
9th - 12th Grade
•
Hard
Quizizz Content
FREE Resource
Student preview

15 questions
Show all answers
1.
FLASHCARD QUESTION
Front
Back
Recon / footprinting, Gaining Access
2.
FLASHCARD QUESTION
Front
What is the goal of social engineering? Options: To make people behave better, To help people make more friends, To have an unauthorized user to determine a user's password using brute force, To get an authorized user to give information to an unauthorized person
Back
To get an authorized user to give information to an unauthorized person
3.
FLASHCARD QUESTION
Front
What is the main method used in social engineering? Options: Brute Force, Complex Algorithms, Ransom attacks, Deception
Back
Deception
4.
FLASHCARD QUESTION
Front
Which is NOT a reason that Social Engineering is so successful? Options: Humans want to avoid confrontation, Humans make sloppy mistakes, Humans want to be helpful, Humans are good at problem solving
Back
Humans are good at problem solving
5.
FLASHCARD QUESTION
Front
Which Social Engineering technique is best protected against by use of a security guard or turnstile? Options: Shoulder Surfing, Dumpster Diving, Baiting, Piggybacking
Back
Piggybacking
6.
FLASHCARD QUESTION
Front
What is considered the single biggest threat in the digital world and was used in 67% of cyber attacks last year? (Options: Shoulder Surfing, Piggybacking, Dumpster Diving, Phishing)
Back
Phishing
7.
FLASHCARD QUESTION
Front
Which of the following is NOT an indication that the email might be a phishing email? URL doesn't match the text, Misspellings, Sender and email address don't match, Email was sent in the middle of the night
Back
Email was sent in the middle of the night
Create a free account and access millions of resources
Similar Resources on Quizizz
11 questions
Design Thinking 2

Flashcard
•
9th - 12th Grade
7 questions
Information Security & Privacy

Flashcard
•
KG - University
12 questions
Identity Theft

Flashcard
•
8th - 12th Grade
10 questions
5.03 Business Essentials

Flashcard
•
9th - 12th Grade
12 questions
Device Configuration and Management- Domains 3 & 4

Flashcard
•
9th - 12th Grade
10 questions
Future Jobs

Flashcard
•
9th - 12th Grade
16 questions
Personal Finance: Fraud

Flashcard
•
9th - 12th Grade
7 questions
Information Security & Privacy

Flashcard
•
KG - University
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade
Discover more resources for Computers
25 questions
Spanish preterite verbs (irregular/changed)

Quiz
•
9th - 10th Grade
10 questions
Identify Slope and y-intercept (from equation)

Quiz
•
8th - 9th Grade
10 questions
Juneteenth: History and Significance

Interactive video
•
7th - 12th Grade
8 questions
"Keeping the City of Venice Afloat" - STAAR Bootcamp, Day 1

Quiz
•
9th - 12th Grade
26 questions
June 19th

Quiz
•
4th - 9th Grade
20 questions
Distance, Midpoint, and Slope

Quiz
•
10th Grade
20 questions
Figurative Language Review

Quiz
•
10th Grade
27 questions
STAAR English 1 Review

Quiz
•
9th Grade