
Foundations of Cyber Security: Quiz 3
Authored by John Coder
Computers
Professional Development
Used 7+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
FILL IN THE BLANKS QUESTION
1 min • 1 pt
p (a) is the use of digital communications to trick people into revealing sensitive data or deploying malicious software.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The use of text messages to trick users, in order to obtain sensitive information or to impersonate a known source.
BEC
Spear phishing
Whaling
Vishing
Smishing
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A threat actor sends an email message that seems to be from a known source to make a seemingly legitimate request for information, in order to obtain a financial advantage.
BEC
Spear phishing
Whaling
Vishing
Smishing
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A malicious email attack that targets a specific user or group of users. The email seems to originate from a trusted source.
BEC
Spear phishing
Whaling
Vishing
Smishing
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Threat actors target company executives to gain access to sensitive data.
BEC
Spear phishing
Whaling
Vishing
Smishing
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source
BEC
Spear phishing
Whaling
Vishing
Smishing
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
BEC
A threat actor sends an email message that seems to be from a known source to make a seemingly legitimate request for information, in order to obtain a financial advantage.
A malicious email attack that targets a specific user or group of users. The email seems to originate from a trusted source.
A form of spear phishing. Threat actors target company executives to gain access to sensitive data.
The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source.
The use of text messages to trick users, in order to obtain sensitive information or to impersonate a known source.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?