Cyber security

Cyber security

12th Grade

10 Qs

quiz-placeholder

Similar activities

AITH Pre-Test

AITH Pre-Test

12th Grade

10 Qs

Algoritmos Simples

Algoritmos Simples

12th Grade

15 Qs

Kuis Password Manager

Kuis Password Manager

KG - Professional Development

10 Qs

Drawing 1

Drawing 1

12th Grade

10 Qs

[FSW] PRE-Test Chapter 7

[FSW] PRE-Test Chapter 7

12th Grade - Professional Development

15 Qs

IT Introduction

IT Introduction

9th - 12th Grade

10 Qs

Malware and Attack Technologies

Malware and Attack Technologies

9th - 12th Grade

12 Qs

Hari 3 - Kuis Coding & Perkenalan AI

Hari 3 - Kuis Coding & Perkenalan AI

12th Grade - University

11 Qs

Cyber security

Cyber security

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Victoria Price

Used 6+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

A set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes

Society engineering

Social endangering

Social engineering

Social escaping

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is different about social engineering, in comparison to other cybercrimes?

Machines tricking machines

Humans tricking humans

Humans tricking machines

Machines tricking humans

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What do we call an attack that involves the attacker watching the victim while they provide sensitive information?

Shoulder somersaulting

Shoulder suggesting

Shoulder singing

Shoulder surfing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What do we call attacks in which the victim is asked in an app or a social media post to combine a few pieces of information or complete a short quiz to produce a name?

Name generator

Word generator

Guess generator

People generator

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is the name of an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data?


Praying

Phishing

Wishing

Singing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What do we call an attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money?

Blinking

Blasting

Blogging

Blagging

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Media Image

Greatest F1 driver of all time

Lewis Hamilton

Lewis Hamilton

Lewis Hamilton

Lewis Hamilton

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?