Social Engineering - CyberSecurity

Social Engineering - CyberSecurity

9th - 12th Grade

8 Qs

quiz-placeholder

Similar activities

Cybersecurity L3: types of attacks

Cybersecurity L3: types of attacks

9th Grade

10 Qs

Cybersecurity threats 1

Cybersecurity threats 1

9th Grade

10 Qs

Data Stealing and Malware

Data Stealing and Malware

9th - 11th Grade

10 Qs

J808 LO4.1.3 Social Engineering

J808 LO4.1.3 Social Engineering

10th - 11th Grade

11 Qs

Understanding Potential Risks in Cybersecurity and Prevention Strategies

Understanding Potential Risks in Cybersecurity and Prevention Strategies

9th - 12th Grade

11 Qs

Social Engineering Starter

Social Engineering Starter

8th - 9th Grade

7 Qs

Methods of Attack

Methods of Attack

KG - University

8 Qs

Data Security

Data Security

5th - 10th Grade

10 Qs

Social Engineering - CyberSecurity

Social Engineering - CyberSecurity

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

H Valli

Used 8+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most accurate definition of Shoulder

The ability to hack someones account by coding

When people physically look over someones shoulder

When people virtually look over someones shoulder

A combination of both physical and virtual method to look over someoners shoulder

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of therse is NOT a Social engineering attack

Phishing

Blagging

Shouldering

DDOS

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Blagging

Convincing 1000's of people to send details or money to you

Convincing a couple people when they respond to ONLY a phishing attack

Convincing a couple people when they respond to any attack

none of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What type of social engineering attack is this?

Phishing

Hacking

Shouldering

Blagging

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main aim of any cyberattack?

To gain data

To get money

To have fun

None of the above

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes’ is a definition of which of the following key terms?

Shouldering

Phishing

Blagging

Social Engineering

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is when attackers create short, fun quizzes in an attempt to find out key pieces of information that can help them answer account security questions?

Shouldering

Name Generator Attack

Phishing

Blagging

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following are key indicators of a phishing attack?

The email address looks odd

There is a suspicious hyperlink

Spelling Errors

All of the above