2.6 Social Engineering 3

2.6 Social Engineering 3

12th Grade

12 Qs

quiz-placeholder

Similar activities

Ciberataque al Gobierno de Costa Rica

Ciberataque al Gobierno de Costa Rica

12th Grade

15 Qs

Technology and Ethics

Technology and Ethics

9th - 12th Grade

14 Qs

Security Chapter 1 Vocab Review

Security Chapter 1 Vocab Review

11th Grade - University

10 Qs

Quiz No.1 (PNETSEC)

Quiz No.1 (PNETSEC)

12th Grade

15 Qs

Q2 E-Tech Newton (WISE Test)

Q2 E-Tech Newton (WISE Test)

12th Grade

8 Qs

Technical Terms - Internet (A-Z) - SYN Flood

Technical Terms - Internet (A-Z) - SYN Flood

12th Grade

10 Qs

Human Resources and Ethics

Human Resources and Ethics

10th - 12th Grade

9 Qs

BTEC UNIT 1 THE ONLINE WORLD QUIZ 1

BTEC UNIT 1 THE ONLINE WORLD QUIZ 1

12th Grade

10 Qs

2.6 Social Engineering 3

2.6 Social Engineering 3

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Amy Austin

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term is used to describe the act of looking over someone's shoulder to gather information without their knowledge?

Browsing Sniping

Shoulder Surfing

Back Watching

Screen Peeking

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why are USB devices considered risky?

They have high storage capacity.

They offer strong encryption.

They have no access controls.

They are expensive to replace.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a keylogger do?

Encrypts data for secure transmission.

Captures usernames and passwords.

Blocks unauthorized access to systems.

Detects and removes viruses.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common characteristic of Spam?

Malicious link

Instant messaging

Banner ads

Embedded URL

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Spim is typically associated with which of the following?

Spam emails

Banner ads

Instant messaging

Embedded URL

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a characteristic of a hoax?

Bad spelling

Good grammar

Many tactics

Convincing to target

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT listed as a motivation for cybercriminals?

Financial gain

Risk-taking

Educational purposes

Revenge politics

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?