2.5 Social Engineering -2

2.5 Social Engineering -2

12th Grade

11 Qs

quiz-placeholder

Similar activities

Social Media

Social Media

12th Grade

15 Qs

DETECTING AND PREVENTING CYBER SECURITY THREATS

DETECTING AND PREVENTING CYBER SECURITY THREATS

9th - 12th Grade

15 Qs

Computer Security Risk

Computer Security Risk

12th Grade - University

16 Qs

IT Security Threats

IT Security Threats

10th - 12th Grade

11 Qs

Chapter 7: Risk, Reputation, & Crisis Review (1)

Chapter 7: Risk, Reputation, & Crisis Review (1)

12th Grade

10 Qs

IBA/CIW REVIEW TEST-B

IBA/CIW REVIEW TEST-B

9th - 12th Grade

15 Qs

Online Safety

Online Safety

6th - 12th Grade

11 Qs

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

2.5 Social Engineering -2

2.5 Social Engineering -2

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Amy Austin

Used 1+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is considered the only solution to social engineering according to the learning material?

Frequent software updates

Stronger passwords

Education

Advanced firewalls

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT mentioned as a characteristic of social engineering in the learning material?

Hard to deflect

Hard to track

Easy to prevent

Hard to catch

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT listed as a factor of manipulation and motivation?

Moral obligation

Trust

Curiosity

Greed

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is considered a factor of manipulation and motivation according to the slide?

Kindness

Ignorance

Wisdom

Education

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a stage in the Social Engineering Process?

Research

Development

Exploitation

Maintenance

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a part of the Exploitation Phase in security?

Disclose password and username

Provide social proof

Perform social engineering

Expose trade secrets

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one of the actions that can be taken during the Exploitation Phase to compromise security?

Update antivirus software

Insert a malicious payload

Change passwords regularly

Use two-factor authentication

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?