2.5 Social Engineering -2

2.5 Social Engineering -2

12th Grade

11 Qs

quiz-placeholder

Similar activities

Social Media

Social Media

9th - 12th Grade

10 Qs

Social Media

Social Media

12th Grade

15 Qs

MIL Reviewer 1 - DepEd Common

MIL Reviewer 1 - DepEd Common

12th Grade

10 Qs

Chapter 9: Social Media & Big Data Review

Chapter 9: Social Media & Big Data Review

12th Grade

15 Qs

Computer Security Risk

Computer Security Risk

12th Grade - University

16 Qs

2.3 Social Engineering

2.3 Social Engineering

9th - 12th Grade

15 Qs

PRE-ASSESSMENT ETECH  M1

PRE-ASSESSMENT ETECH M1

12th Grade

10 Qs

EMTECH Evidence-based Web Design

EMTECH Evidence-based Web Design

11th Grade - University

15 Qs

2.5 Social Engineering -2

2.5 Social Engineering -2

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Amy Austin

Used 4+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is considered the only solution to social engineering according to the learning material?

Frequent software updates

Stronger passwords

Education

Advanced firewalls

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT mentioned as a characteristic of social engineering in the learning material?

Hard to deflect

Hard to track

Easy to prevent

Hard to catch

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT listed as a factor of manipulation and motivation?

Moral obligation

Trust

Curiosity

Greed

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is considered a factor of manipulation and motivation according to the slide?

Kindness

Ignorance

Wisdom

Education

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a stage in the Social Engineering Process?

Research

Development

Exploitation

Maintenance

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a part of the Exploitation Phase in security?

Disclose password and username

Provide social proof

Perform social engineering

Expose trade secrets

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one of the actions that can be taken during the Exploitation Phase to compromise security?

Update antivirus software

Insert a malicious payload

Change passwords regularly

Use two-factor authentication

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?