Quiz - Garden State Cyber Unit 2.1

Quiz - Garden State Cyber Unit 2.1

9th - 12th Grade

9 Qs

quiz-placeholder

Similar activities

Lesson 5 - Network Threats

Lesson 5 - Network Threats

9th Grade

13 Qs

Social Engineering

Social Engineering

9th - 12th Grade

8 Qs

1.5.3 - Starter Tasks/Network Threats (Dg)

1.5.3 - Starter Tasks/Network Threats (Dg)

11th Grade

12 Qs

Technical Terms - Internet (A-Z) - Social Engineering

Technical Terms - Internet (A-Z) - Social Engineering

12th Grade

10 Qs

Intro to Robotics

Intro to Robotics

9th Grade

14 Qs

Social Engineering

Social Engineering

11th Grade

12 Qs

Network Security Revision

Network Security Revision

11th Grade

10 Qs

Social Engineering Game

Social Engineering Game

9th - 12th Grade

12 Qs

Quiz - Garden State Cyber Unit 2.1

Quiz - Garden State Cyber Unit 2.1

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

Anthony DellaRosa

Used 1+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 2 pts

Which two of the following step of hacking are most likely to involve the use of social engineering? (pick 2)
Recon / footprinting
Gaining Access
Scanning / Probing
Escalating Privileges
Exploiting

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What is the goal of social engineering?
To make people behave better
To help people make more friends
To get an authorized user to give information to an unauthorized person
To have an unauthorized user to determine a user's password using brute force

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What is the main method used in social engineering?
Brute Force
Deception
Complex Algorithms
Ransom attacks

4.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Which is NOT a reason that Social Engineering is so successful?
Humans want to be helpful
Humans make sloppy mistakes
Humans want to avoid confrontation
Humans are good at problem solving

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Which of the following Social Engineering techniques are best protected against by use of a security guard or turnstile?
Piggybacking
Shoulder Surfing
Dumpster Diving
Baiting

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a technique of social engineering?

Shoulder Surfing

Kneecapping

Piggybacking

Dumpster Diving

7.

OPEN ENDED QUESTION

3 mins • 1 pt

What is social engineering?

Evaluate responses using AI:

OFF

8.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What is it called when you use a phone to perform a social engineering attack

9.

MATCH QUESTION

1 min • 1 pt

Match the following

Piggybacking

offering something of value such as a prize if you click or leaving a USB drive to be found.

Scareware

retrieve discarded paper information

Pretexting

this is where someone goes through a door after you have swiped in OR you hold the door open for them without making them authenticate.

Baiting

Wearing a “uniform” or using authority –an IT Tech support type of uniform that will get access to a computer

Dumpster diving

making people believe that malware has been installed and that they need to give you access or install software to “fix it”