2.8 Social Engineering 5

2.8 Social Engineering 5

12th Grade

23 Qs

quiz-placeholder

Similar activities

Cyber Security

Cyber Security

8th - 12th Grade

20 Qs

040_An Overview of Malware – CompTIA Security+ SY0-701

040_An Overview of Malware – CompTIA Security+ SY0-701

9th Grade - University

20 Qs

024_Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2

024_Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2

9th Grade - University

25 Qs

Chapter 11: Security and Privacy

Chapter 11: Security and Privacy

10th Grade - University

24 Qs

Computer Security Measures

Computer Security Measures

11th Grade - University

20 Qs

Introduction to Cybersecurity Final Exam Units 1-8

Introduction to Cybersecurity Final Exam Units 1-8

9th - 12th Grade

20 Qs

024_Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2

024_Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2

9th Grade - University

20 Qs

Cyber security

Cyber security

12th Grade

25 Qs

2.8 Social Engineering 5

2.8 Social Engineering 5

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Amy Austin

Used 8+ times

FREE Resource

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a characteristic of phishing?

It is easily identifiable as fraudulent.

It appears trustworthy.

It is only sent to a few selected individuals.

It is always blocked by email filters.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do phishing attackers typically distribute their messages?

By sending personalized emails to each individual.

By posting on social media.

By sending mass emails.

By making phone calls.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the appearance of phishing emails?

They look suspicious and are easy to spot.

They contain a lot of spelling and grammar mistakes.

They look legitimate.

They are usually filtered into the spam folder.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the email shown in the image?

To inform Tim Landon about a legitimate transaction

To request personal contact information under the guise of returning money

To confirm a scheduled meeting with Tim Landon

To provide customer service support for a PayPal transaction

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the two key actions involved in Spear Phishing according to the learning material?

Send random emails, Use malware

Gather information, Send specific email

Hack into servers, Steal passwords

Create fake websites, Trick users

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is SMiShing commonly characterized by?

A) A legitimate text message asking for personal information

B) A text message with an urgent topic requiring immediate action and containing a malware link

C) A phone call from a trusted organization

D) An email with a secure attachment

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a method used in pharming to redirect a user's traffic?

Installing antivirus software

DNS cache poisoning

Updating browser

Using a firewall

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?