Y9 Hwk Quiz 1 (Social Engineering)

Quiz
•
Computers
•
9th Grade
•
Hard
Mr Renshaw
Used 30+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The email above may be what type of attack?
Shouldering
Phishing
Blagging
Hacking
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
‘A set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes’ is a definition of which of the following key terms?
Shouldering
Phishing
Blagging
Social Engineering
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is when attackers create short, fun quizzes in an attempt to find out key pieces of information that can help them answer account security questions?
Blagging
Shouldering
Name generator attack
Phishing
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Shouldering is...
the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.
the attacker watching the victim while they provide sensitive information
he victim is asked in an app or a social media post to combine a few pieces of information or complete a short quiz to produce a name.
the perpetrator invents a scenario in order to convince the victim to give them data or money.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
phishing is...
the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.
the attacker watching the victim while they provide sensitive information
he victim is asked in an app or a social media post to combine a few pieces of information or complete a short quiz to produce a name.
the perpetrator invents a scenario in order to convince the victim to give them data or money.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
name generator attacks are...
the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.
the attacker watching the victim while they provide sensitive information
he victim is asked in an app or a social media post to combine a few pieces of information or complete a short quiz to produce a name.
the perpetrator invents a scenario in order to convince the victim to give them data or money.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
blagging is...
the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.
the attacker watching the victim while they provide sensitive information
he victim is asked in an app or a social media post to combine a few pieces of information or complete a short quiz to produce a name.
the perpetrator invents a scenario in order to convince the victim to give them data or money.
Create a free account and access millions of resources
Similar Resources on Wayground
20 questions
ICT Basics

Quiz
•
4th - 9th Grade
19 questions
SEMI - Unit 2

Quiz
•
9th - 12th Grade
12 questions
Computer Components

Quiz
•
9th Grade
14 questions
year 8 lesson 2 quiz - python

Quiz
•
8th - 10th Grade
14 questions
Protecting Personal Data

Quiz
•
7th - 9th Grade
10 questions
Google Docs - Tables

Quiz
•
9th - 10th Grade
10 questions
Understanding Cybersecurity

Quiz
•
5th Grade - Professio...
14 questions
10.2 Cybersecurity

Quiz
•
9th - 12th Grade
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
20 questions
Analog vs Digital

Quiz
•
9th - 12th Grade
10 questions
Exploring Cybersecurity Techniques and Threats

Interactive video
•
6th - 10th Grade
10 questions
Understanding the Internet and Data Transmission

Interactive video
•
7th - 12th Grade