
2.8 Social Engineering 5
Authored by Amy Austin
Computers
12th Grade
Used 18+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
23 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a characteristic of phishing?
It is easily identifiable as fraudulent.
It appears trustworthy.
It is only sent to a few selected individuals.
It is always blocked by email filters.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How do phishing attackers typically distribute their messages?
By sending personalized emails to each individual.
By posting on social media.
By sending mass emails.
By making phone calls.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes the appearance of phishing emails?
They look suspicious and are easy to spot.
They contain a lot of spelling and grammar mistakes.
They look legitimate.
They are usually filtered into the spam folder.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of the email shown in the image?
To inform Tim Landon about a legitimate transaction
To request personal contact information under the guise of returning money
To confirm a scheduled meeting with Tim Landon
To provide customer service support for a PayPal transaction
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the two key actions involved in Spear Phishing according to the learning material?
Send random emails, Use malware
Gather information, Send specific email
Hack into servers, Steal passwords
Create fake websites, Trick users
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is SMiShing commonly characterized by?
A) A legitimate text message asking for personal information
B) A text message with an urgent topic requiring immediate action and containing a malware link
C) A phone call from a trusted organization
D) An email with a secure attachment
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a method used in pharming to redirect a user's traffic?
Installing antivirus software
DNS cache poisoning
Updating browser
Using a firewall
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
21 questions
CPA MS-Office Hotkeys Quiz
Quiz
•
8th Grade - Professio...
20 questions
Bloque I Mi marca personal
Quiz
•
5th Grade - University
18 questions
Quiz on Misinformation and Bias
Quiz
•
10th Grade - University
20 questions
Ինֆորմատիկա 10 II կիսամյակի ամփոփիչ աշխատանք
Quiz
•
10th - 12th Grade
20 questions
G11 ITGS Test 1 Revision
Quiz
•
11th - 12th Grade
20 questions
Online Platform Block Q
Quiz
•
11th - 12th Grade
20 questions
City & Guilds Award in Business Processes
Quiz
•
12th Grade
20 questions
Access Lesson 7
Quiz
•
9th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
22 questions
El Imperfecto
Quiz
•
9th - 12th Grade
20 questions
SSS/SAS
Quiz
•
9th - 12th Grade
20 questions
verbos reflexivos en español
Quiz
•
9th - 12th Grade
14 questions
Making Inferences From Samples
Quiz
•
7th - 12th Grade
23 questions
CCG - CH8 Polygon angles and area Review
Quiz
•
9th - 12th Grade
8 questions
Momentum and Collisions
Lesson
•
9th - 12th Grade
28 questions
Ser vs estar
Quiz
•
9th - 12th Grade