Network Security - Phishing & Social Engineering

Network Security - Phishing & Social Engineering

8th - 11th Grade

11 Qs

quiz-placeholder

Similar activities

Parcial 1, Primera serie

Parcial 1, Primera serie

6th Grade - University

10 Qs

After Effect Intoduction

After Effect Intoduction

10th Grade - University

15 Qs

Spreadsheets

Spreadsheets

6th - 8th Grade

13 Qs

Quizz Internet

Quizz Internet

KG - Professional Development

12 Qs

BÀI KIỂM TRA GIỮA KÌ 2 LỚP 5

BÀI KIỂM TRA GIỮA KÌ 2 LỚP 5

1st - 10th Grade

10 Qs

Empowerment Technologies Quiz 2

Empowerment Technologies Quiz 2

11th Grade

10 Qs

Chapter 3 Exploring Linux Filesystems

Chapter 3 Exploring Linux Filesystems

11th Grade - University

10 Qs

IP ADDRESSING AND ITS VERSION

IP ADDRESSING AND ITS VERSION

11th Grade

15 Qs

Network Security - Phishing & Social Engineering

Network Security - Phishing & Social Engineering

Assessment

Quiz

Computers

8th - 11th Grade

Practice Problem

Medium

Created by

Henry Sanderson

Used 88+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The weakest point in a security system, is usually:

Poorly coded software

People

Unreliable hardware

Poor network connections

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is PHISHING?

Where a device is used to intercept packets of data as they are transferred across a network. This data is then analysed to look for passwords and other personal data.

Where an executable file is secretly installed to record each key pressed and send

Writing a snippet of code to try and retrieve data from a machine

Sending emails pretending to be from reputable companies to try and get people to reveal personal information

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False: Phishing is only done through email. It never uses any other messaging service.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a social engineering technique?

Blagging

Hacking

Phishing

Pharming

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following people should you share your password with when they ask?

Network managers

Call centre workers

Security experts

Company managers

Nobody

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following most closely matches the definition of 'Blagging'?

Sending an e-mail to a user pretending to be someone else

Hacking a person's computer

Tricking a person into revealing some personal information

Observing a legitimate user entering a password

Setting up a fake website that looks like an official website

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which account should have your most secure password?

Bank Account

School Account

Primary Email Account

Social Media Account

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?