2.8 Social Engineering 5

2.8 Social Engineering 5

12th Grade

23 Qs

quiz-placeholder

Similar activities

IT Security - One

IT Security - One

12th Grade

20 Qs

Be Internet Awesome Part 1

Be Internet Awesome Part 1

6th - 12th Grade

21 Qs

SOCIETAL IMPACT(2021-22)

SOCIETAL IMPACT(2021-22)

12th Grade

25 Qs

EOC Review IT FOUND

EOC Review IT FOUND

9th - 12th Grade

20 Qs

Digital Citizenship Questions Only

Digital Citizenship Questions Only

4th Grade - University

19 Qs

AP CSP Unit 8 Cyber Security and Global Impacts

AP CSP Unit 8 Cyber Security and Global Impacts

12th Grade

20 Qs

Understanding Security Concepts Quiz

Understanding Security Concepts Quiz

12th Grade

20 Qs

Digital Media - Chapter 1

Digital Media - Chapter 1

9th - 12th Grade

20 Qs

2.8 Social Engineering 5

2.8 Social Engineering 5

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Amy Austin

Used 11+ times

FREE Resource

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a characteristic of phishing?

It is easily identifiable as fraudulent.

It appears trustworthy.

It is only sent to a few selected individuals.

It is always blocked by email filters.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do phishing attackers typically distribute their messages?

By sending personalized emails to each individual.

By posting on social media.

By sending mass emails.

By making phone calls.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the appearance of phishing emails?

They look suspicious and are easy to spot.

They contain a lot of spelling and grammar mistakes.

They look legitimate.

They are usually filtered into the spam folder.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the email shown in the image?

To inform Tim Landon about a legitimate transaction

To request personal contact information under the guise of returning money

To confirm a scheduled meeting with Tim Landon

To provide customer service support for a PayPal transaction

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the two key actions involved in Spear Phishing according to the learning material?

Send random emails, Use malware

Gather information, Send specific email

Hack into servers, Steal passwords

Create fake websites, Trick users

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is SMiShing commonly characterized by?

A) A legitimate text message asking for personal information

B) A text message with an urgent topic requiring immediate action and containing a malware link

C) A phone call from a trusted organization

D) An email with a secure attachment

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a method used in pharming to redirect a user's traffic?

Installing antivirus software

DNS cache poisoning

Updating browser

Using a firewall

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers