
Foundations of Cyber Security: Quiz 3
Authored by John Coder
Computers
Professional Development
Used 7+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
1 min • 1 pt
p_____________ is the use of digital communications to trick people into revealing sensitive data or deploying malicious software.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The use of text messages to trick users, in order to obtain sensitive information or to impersonate a known source.
BEC
Spear phishing
Whaling
Vishing
Smishing
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A threat actor sends an email message that seems to be from a known source to make a seemingly legitimate request for information, in order to obtain a financial advantage.
BEC
Spear phishing
Whaling
Vishing
Smishing
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A malicious email attack that targets a specific user or group of users. The email seems to originate from a trusted source.
BEC
Spear phishing
Whaling
Vishing
Smishing
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Threat actors target company executives to gain access to sensitive data.
BEC
Spear phishing
Whaling
Vishing
Smishing
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source
BEC
Spear phishing
Whaling
Vishing
Smishing
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
BEC
A threat actor sends an email message that seems to be from a known source to make a seemingly legitimate request for information, in order to obtain a financial advantage.
A malicious email attack that targets a specific user or group of users. The email seems to originate from a trusted source.
A form of spear phishing. Threat actors target company executives to gain access to sensitive data.
The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source.
The use of text messages to trick users, in order to obtain sensitive information or to impersonate a known source.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
JOB PRO - SOFTWARE
Quiz
•
Professional Development
17 questions
Mitos Ou Verdade? Parada Pedagógica TI 2024
Quiz
•
Professional Development
15 questions
Excel for Business Q2
Quiz
•
Professional Development
17 questions
Lección1 - JavaScript
Quiz
•
1st Grade - Professio...
15 questions
Computer basics for beginners
Quiz
•
Professional Development
15 questions
Sec+ CH.2 Review Test
Quiz
•
Professional Development
15 questions
Latihan TIK
Quiz
•
Professional Development
15 questions
Unit 1 lesson 1
Quiz
•
University - Professi...
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
15 questions
LOTE_SPN2 5WEEK3 Day 2 Itinerary
Quiz
•
Professional Development
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
42 questions
LOTE_SPN2 5WEEK2 Day 4 We They Actividad 3
Quiz
•
Professional Development
6 questions
Copy of G5_U6_L3_22-23
Lesson
•
KG - Professional Dev...
20 questions
Employability Skills
Quiz
•
Professional Development