
Study
Authored by Mya Macfarland
Computers
Professional Development

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
24 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A social engineering technique whereby attackers under disguise of a legitimate request attempt to gain access to confidential information is commonly referred to as:
Phishing
Privilege escalation
Backdoor access
Shoulder surfing
2.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following answers refer to smishing? (Select 2 answers)
Social engineering technique
E-mail communication
Spam over Internet Telephony (SPIT)
Text messaging
Spam over Internet Messaging (SPIM)
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The practice of using a telephone system to manipulate user into disclosing confidential information is known as:
Whaling
Spear phishing
Vishing
Pharming
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following terms is commonly used to describe an unsolicited advertising message?
Spyware
Adware
Malware
Spam
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of spam relies on text-based communication?
Vishing
SPIM
SPIT
Bluesnarfing
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Phishing scams targeting a specific group of people are referred to as:
Vishing
Spear phishing
Spoofing
Whaling
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In computer security, the term "Dumpster diving" is used to describe a practice of sifting through trash for discarded documents containing sensitive data. Found documents containing names and surnames of the employees along with the information about positions held in the company and other data can be used to facilitate social engineering attacks. Having the documents shredded or incinerated before disposal makes dumpster diving less effective and mitigates the risk of social engineering attacks.
True
False
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
Nest JS - Parte 01
Quiz
•
Professional Development
20 questions
Tout savoir sur WINDOWS Quizz 1
Quiz
•
Professional Development
20 questions
ĐÀO TẠO DẪN NHẬP KHỐI CNTT
Quiz
•
Professional Development
20 questions
System and network support and management
Quiz
•
11th Grade - Professi...
20 questions
JavaScript
Quiz
•
Professional Development
20 questions
¿Cuánto sabes de comercio electrónico?
Quiz
•
Professional Development
20 questions
Advance Ms-Word
Quiz
•
10th Grade - Professi...
20 questions
Banco de Dados
Quiz
•
University - Professi...
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
Discover more resources for Computers
10 questions
How to Email your Teacher
Quiz
•
Professional Development
6 questions
3RD GRADE DECLARATION OF INDEPENDENCE EXIT TICKET
Quiz
•
Professional Development
19 questions
Black History Month Trivia
Quiz
•
6th Grade - Professio...
22 questions
Multiplying Exponents with the Same Base
Quiz
•
9th Grade - Professio...
40 questions
Flags of the World
Quiz
•
KG - Professional Dev...