
Social Engineering Techniques and Risks

Flashcard
•
Information Technology (IT)
•
11th Grade
•
Hard
Wayground Content
FREE Resource
Student preview

15 questions
Show all answers
1.
FLASHCARD QUESTION
Front
Emma is trying to gain unauthorized access to a company's network. Which two steps in her hacking process are most likely to involve the use of social engineering? (Scanning / Probing, Escalating Privileges, Exploiting, Recon / footprinting, Gaining Access)
Back
Recon / footprinting, Gaining Access
Answer explanation
Social engineering is often used in 'Recon / footprinting' to gather information about targets and in 'Gaining Access' to manipulate individuals into providing access or sensitive information.
2.
FLASHCARD QUESTION
Front
Elijah received a phone call from someone claiming to be from his bank, asking for his account details to verify a transaction. What is the goal of this social engineering attempt?
Back
To get an authorized user to give information to an unauthorized person
Answer explanation
The goal of social engineering is to manipulate an authorized user into divulging confidential information to an unauthorized person, making the correct answer "To get an authorized user to give information to an unauthorized person."
3.
FLASHCARD QUESTION
Front
Scarlett received an email from someone pretending to be her bank, asking for her account details. What is the main method used in this type of social engineering?
Back
Deception
Answer explanation
The main method used in social engineering is deception. Attackers manipulate individuals into divulging confidential information by exploiting trust, rather than using technical methods like brute force or complex algorithms.
4.
FLASHCARD QUESTION
Front
David received an email from someone claiming to be his bank, asking for his account details. Which is NOT a reason that Social Engineering tactics like this are so successful?
Back
Humans are good at problem solving
Answer explanation
Humans being good at problem solving is not a reason for social engineering's success. In fact, effective problem solving can help individuals recognize and resist manipulation, unlike the other options that exploit human tendencies.
5.
FLASHCARD QUESTION
Front
At a busy office building, which Social Engineering technique is best protected against by having a security guard or turnstile at the entrance? Options: Shoulder Surfing, Dumpster Diving, Baiting, Piggybacking
Back
Piggybacking
Answer explanation
Piggybacking involves unauthorized individuals gaining access by following someone with legitimate access. A security guard or turnstile can effectively prevent this by controlling entry, unlike the other techniques listed.
6.
FLASHCARD QUESTION
Front
During a cybersecurity class, Harper learned about a technique that was responsible for 67% of cyber attacks last year. What is this major threat in the digital world?
Back
Phishing
Answer explanation
Phishing is the most significant threat in the digital world, accounting for 67% of cyber attacks last year. It involves tricking individuals into revealing sensitive information, making it a prevalent tactic among cybercriminals.
7.
FLASHCARD QUESTION
Front
Olivia received an email that seemed suspicious. Which of the following is NOT an indication that the email might be a phishing email?
- URL doesn't match the text
- Misspellings
- Sender and email address don't match
- Email was sent in the middle of the night
Back
Email was sent in the middle of the night
Answer explanation
The correct choice is 'Email was sent in the middle of the night' because the time an email is sent does not inherently indicate phishing. In contrast, mismatched URLs, misspellings, and inconsistent sender details are common phishing signs.
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
Cybersecurity - Device Security

Flashcard
•
9th - 12th Grade
14 questions
Unit 2

Flashcard
•
12th Grade
15 questions
Consumer Skills MC Review

Flashcard
•
10th Grade
16 questions
L2 ICT U1 Types of Threat Flashcard

Flashcard
•
11th Grade
10 questions
SSC Summer Camp Pre-Flashcard

Flashcard
•
9th - 12th Grade
10 questions
Social Engineering Prevention - v2

Flashcard
•
12th Grade
10 questions
Sicurezza Informatica per Cittadini Digitali

Flashcard
•
11th Grade
10 questions
Phishing Awareness Flashcard

Flashcard
•
9th - 12th Grade
Popular Resources on Wayground
10 questions
SR&R 2025-2026 Practice Quiz

Quiz
•
6th - 8th Grade
30 questions
Review of Grade Level Rules WJH

Quiz
•
6th - 8th Grade
6 questions
PRIDE in the Hallways and Bathrooms

Lesson
•
12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
15 questions
Subtracting Integers

Quiz
•
7th Grade
Discover more resources for Information Technology (IT)
20 questions
Lab Safety and Lab Equipment

Quiz
•
9th - 12th Grade
7 questions
EAHS PBIS Lesson- Bathroom

Lesson
•
9th - 12th Grade
57 questions
How well do YOU know Neuwirth?

Quiz
•
9th - 12th Grade
20 questions
Getting to know YOU icebreaker activity!

Quiz
•
6th - 12th Grade
6 questions
Secondary Safety Quiz

Lesson
•
9th - 12th Grade
4 questions
Study Skills

Lesson
•
5th - 12th Grade
15 questions
Let's Take a Poll...

Quiz
•
9th Grade - University
20 questions
Points, Lines & Planes

Quiz
•
9th - 11th Grade