
Social Engineering Techniques and Risks
Flashcard
•
Information Technology (IT)
•
11th Grade
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Student preview

15 questions
Show all answers
1.
FLASHCARD QUESTION
Front
Emma is trying to gain unauthorized access to a company's network. Which two steps in her hacking process are most likely to involve the use of social engineering? (Scanning / Probing, Escalating Privileges, Exploiting, Recon / footprinting, Gaining Access)
Back
Recon / footprinting, Gaining Access
Answer explanation
Social engineering is often used in 'Recon / footprinting' to gather information about targets and in 'Gaining Access' to manipulate individuals into providing access or sensitive information.
2.
FLASHCARD QUESTION
Front
Elijah received a phone call from someone claiming to be from his bank, asking for his account details to verify a transaction. What is the goal of this social engineering attempt?
Back
To get an authorized user to give information to an unauthorized person
Answer explanation
The goal of social engineering is to manipulate an authorized user into divulging confidential information to an unauthorized person, making the correct answer "To get an authorized user to give information to an unauthorized person."
3.
FLASHCARD QUESTION
Front
Scarlett received an email from someone pretending to be her bank, asking for her account details. What is the main method used in this type of social engineering?
Back
Deception
Answer explanation
The main method used in social engineering is deception. Attackers manipulate individuals into divulging confidential information by exploiting trust, rather than using technical methods like brute force or complex algorithms.
4.
FLASHCARD QUESTION
Front
David received an email from someone claiming to be his bank, asking for his account details. Which is NOT a reason that Social Engineering tactics like this are so successful?
Back
Humans are good at problem solving
Answer explanation
Humans being good at problem solving is not a reason for social engineering's success. In fact, effective problem solving can help individuals recognize and resist manipulation, unlike the other options that exploit human tendencies.
5.
FLASHCARD QUESTION
Front
At a busy office building, which Social Engineering technique is best protected against by having a security guard or turnstile at the entrance? Options: Shoulder Surfing, Dumpster Diving, Baiting, Piggybacking
Back
Piggybacking
Answer explanation
Piggybacking involves unauthorized individuals gaining access by following someone with legitimate access. A security guard or turnstile can effectively prevent this by controlling entry, unlike the other techniques listed.
6.
FLASHCARD QUESTION
Front
During a cybersecurity class, Harper learned about a technique that was responsible for 67% of cyber attacks last year. What is this major threat in the digital world?
Back
Phishing
Answer explanation
Phishing is the most significant threat in the digital world, accounting for 67% of cyber attacks last year. It involves tricking individuals into revealing sensitive information, making it a prevalent tactic among cybercriminals.
7.
FLASHCARD QUESTION
Front
Olivia received an email that seemed suspicious. Which of the following is NOT an indication that the email might be a phishing email?
- URL doesn't match the text
- Misspellings
- Sender and email address don't match
- Email was sent in the middle of the night
Back
Email was sent in the middle of the night
Answer explanation
The correct choice is 'Email was sent in the middle of the night' because the time an email is sent does not inherently indicate phishing. In contrast, mismatched URLs, misspellings, and inconsistent sender details are common phishing signs.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Famous Company Logos
Flashcard
•
KG
8 questions
Accounting Concepts
Flashcard
•
11th Grade
10 questions
stats vocab 5.1 - 5.2
Flashcard
•
12th Grade
8 questions
MATHEMATICS 10 - Graph of Polynomial Functions PART 1
Flashcard
•
10th Grade
15 questions
Conditional sentences type 2
Flashcard
•
12th Grade
15 questions
Stamped Chapter 1: Understanding Racism
Flashcard
•
10th Grade
10 questions
Printing Press
Flashcard
•
9th - 12th Grade
10 questions
Understanding Network Topologies
Flashcard
•
11th Grade
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Information Technology (IT)
18 questions
Valentines Day Trivia
Quiz
•
3rd Grade - University
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
21 questions
Presidents Day Trivia
Quiz
•
6th - 12th Grade
10 questions
Valentine's Day: History and Modern Celebration
Interactive video
•
9th - 12th Grade
11 questions
Valentine's Day Trivia
Quiz
•
8th - 12th Grade
10 questions
Factor Quadratic Expressions with Various Coefficients
Quiz
•
9th - 12th Grade
10 questions
Evaluating Piecewise Functions Practice
Quiz
•
11th Grade
18 questions
Success Strategies
Quiz
•
9th - 12th Grade