Social Engineering

Social Engineering

University

9 Qs

quiz-placeholder

Similar activities

Ethical Issues and Privacy

Ethical Issues and Privacy

University

9 Qs

Recalling Computing

Recalling Computing

University

10 Qs

Information Security Principles

Information Security Principles

University

10 Qs

Week 1 chapter 2

Week 1 chapter 2

University

10 Qs

Cybersecurity

Cybersecurity

University

10 Qs

Discipline 2

Discipline 2

University

12 Qs

Cybersecurity

Cybersecurity

9th Grade - University

10 Qs

Chapter 5: Privacy

Chapter 5: Privacy

University

10 Qs

Social Engineering

Social Engineering

Assessment

Quiz

Computers

University

Medium

Created by

Samuel Kwarteng

Used 9+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who tries to steal information from people?

Social Engineers

The U.S. Government

Thiefs

Shawn

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the goal of social engineering?


Sabotage a person's social media 

To gain vital personal information

To catfish someone

To buy a car

3.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Spammers want you to:

Not open any links

Think first and act later

Act first and think later

Update your software automatically

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An email claiming that you have won the lottery, as long as you fill out the corresponding information, is an example of what type social engineering attack?


Baiting

Phishing

Piggybacking

Email from a friend

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Definition: Social engineering is the art of manipulating people so they give up confidential information.

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which of these is how to properly avoid becoming a victim of social engineering?

Research the facts

Delete any request for financial information or passwords

Reject requests for help

All of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a social engineering scam?

Shoplifting

Fake emails

Phone call from your doctor

8.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

You should always keep strong passwords to make your device secure

True

False

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack was used in the video we watched

phishing

vishing

tailgating

exercising