Search Header Logo

Foundations of Cyber Security: Quiz 3

Authored by John Coder

Computers

Professional Development

Used 7+ times

Foundations of Cyber Security: Quiz 3
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

p_____________ is the use of digital communications to trick people into revealing sensitive data or deploying malicious software. 

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The use of text messages to trick users, in order to obtain sensitive information or to impersonate a known source.

BEC

Spear phishing

Whaling

Vishing

Smishing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A threat actor sends an email message that seems to be from a known source to make a seemingly legitimate request for information, in order to obtain a financial advantage.

BEC

Spear phishing

Whaling

Vishing

Smishing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A malicious email attack that targets a specific user or group of users. The email seems to originate from a trusted source.

BEC

Spear phishing

Whaling

Vishing

Smishing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Threat actors target company executives to gain access to sensitive data.

BEC

Spear phishing

Whaling

Vishing

Smishing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source

BEC

Spear phishing

Whaling

Vishing

Smishing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

BEC

A threat actor sends an email message that seems to be from a known source to make a seemingly legitimate request for information, in order to obtain a financial advantage.

A malicious email attack that targets a specific user or group of users. The email seems to originate from a trusted source.

A form of spear phishing. Threat actors target company executives to gain access to sensitive data.

The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source.

The use of text messages to trick users, in order to obtain sensitive information or to impersonate a known source.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?