
Social Engineering Techniques and Risks
Flashcard
•
Information Technology (IT)
•
11th Grade
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Student preview

15 questions
Show all answers
1.
FLASHCARD QUESTION
Front
Emma is trying to gain unauthorized access to a company's network. Which two steps in her hacking process are most likely to involve the use of social engineering? (Scanning / Probing, Escalating Privileges, Exploiting, Recon / footprinting, Gaining Access)
Back
Recon / footprinting, Gaining Access
Answer explanation
Social engineering is often used in 'Recon / footprinting' to gather information about targets and in 'Gaining Access' to manipulate individuals into providing access or sensitive information.
2.
FLASHCARD QUESTION
Front
Elijah received a phone call from someone claiming to be from his bank, asking for his account details to verify a transaction. What is the goal of this social engineering attempt?
Back
To get an authorized user to give information to an unauthorized person
Answer explanation
The goal of social engineering is to manipulate an authorized user into divulging confidential information to an unauthorized person, making the correct answer "To get an authorized user to give information to an unauthorized person."
3.
FLASHCARD QUESTION
Front
Scarlett received an email from someone pretending to be her bank, asking for her account details. What is the main method used in this type of social engineering?
Back
Deception
Answer explanation
The main method used in social engineering is deception. Attackers manipulate individuals into divulging confidential information by exploiting trust, rather than using technical methods like brute force or complex algorithms.
4.
FLASHCARD QUESTION
Front
David received an email from someone claiming to be his bank, asking for his account details. Which is NOT a reason that Social Engineering tactics like this are so successful?
Back
Humans are good at problem solving
Answer explanation
Humans being good at problem solving is not a reason for social engineering's success. In fact, effective problem solving can help individuals recognize and resist manipulation, unlike the other options that exploit human tendencies.
5.
FLASHCARD QUESTION
Front
At a busy office building, which Social Engineering technique is best protected against by having a security guard or turnstile at the entrance? Options: Shoulder Surfing, Dumpster Diving, Baiting, Piggybacking
Back
Piggybacking
Answer explanation
Piggybacking involves unauthorized individuals gaining access by following someone with legitimate access. A security guard or turnstile can effectively prevent this by controlling entry, unlike the other techniques listed.
6.
FLASHCARD QUESTION
Front
During a cybersecurity class, Harper learned about a technique that was responsible for 67% of cyber attacks last year. What is this major threat in the digital world?
Back
Phishing
Answer explanation
Phishing is the most significant threat in the digital world, accounting for 67% of cyber attacks last year. It involves tricking individuals into revealing sensitive information, making it a prevalent tactic among cybercriminals.
7.
FLASHCARD QUESTION
Front
Olivia received an email that seemed suspicious. Which of the following is NOT an indication that the email might be a phishing email?
- URL doesn't match the text
- Misspellings
- Sender and email address don't match
- Email was sent in the middle of the night
Back
Email was sent in the middle of the night
Answer explanation
The correct choice is 'Email was sent in the middle of the night' because the time an email is sent does not inherently indicate phishing. In contrast, mismatched URLs, misspellings, and inconsistent sender details are common phishing signs.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
9 questions
Parts of a Computer
Flashcard
•
9th - 12th Grade
13 questions
[AP CSP] Binary Conversion
Flashcard
•
9th - 12th Grade
16 questions
Phrasal Verbs Related to Food & Eating
Flashcard
•
10th Grade
10 questions
Output Devices
Flashcard
•
10th Grade
13 questions
Simple Tips for Healthy Eating
Flashcard
•
10th Grade
15 questions
The Genre of Science Fiction
Flashcard
•
11th - 12th Grade
10 questions
Synthetic Personalisation A level English
Flashcard
•
12th Grade - University
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
Discover more resources for Information Technology (IT)
26 questions
Christmas Movie Trivia
Lesson
•
8th Grade - Professio...
15 questions
Christmas Song Emoji Pictionary
Quiz
•
7th - 12th Grade
20 questions
Christmas Movies
Quiz
•
1st - 12th Grade
20 questions
Christmas Movie Trivia
Quiz
•
9th - 12th Grade
29 questions
christmas facts
Lesson
•
5th - 12th Grade
20 questions
Christmas Trivia
Quiz
•
5th - 12th Grade
20 questions
Stages of Meiosis
Quiz
•
9th - 12th Grade
20 questions
christmas songs
Quiz
•
KG - University