
2.5 Social Engineering -2
Authored by Amy Austin
Computers
12th Grade
Used 8+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
11 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is considered the only solution to social engineering according to the learning material?
Frequent software updates
Stronger passwords
Education
Advanced firewalls
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT mentioned as a characteristic of social engineering in the learning material?
Hard to deflect
Hard to track
Easy to prevent
Hard to catch
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT listed as a factor of manipulation and motivation?
Moral obligation
Trust
Curiosity
Greed
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is considered a factor of manipulation and motivation according to the slide?
Kindness
Ignorance
Wisdom
Education
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a stage in the Social Engineering Process?
Research
Development
Exploitation
Maintenance
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a part of the Exploitation Phase in security?
Disclose password and username
Provide social proof
Perform social engineering
Expose trade secrets
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is one of the actions that can be taken during the Exploitation Phase to compromise security?
Update antivirus software
Insert a malicious payload
Change passwords regularly
Use two-factor authentication
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?