Search Header Logo

Social Engineering Tactics

Authored by Lewis Weeden

Computers

12th Grade

Used 1+ times

Social Engineering Tactics
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What social engineering tactic is being used here:

An attacker pretends to be the company's CEO and provides an employee a PDF to open. The employee trusts the CEO and opens the PDF which contains malware.

Authority

Intimidation

Familiarity

Urgency

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What social engineering tactic is being used here:

A secretary receives a call from an attacker claiming that their boss is about to give a presentation and the file they provided is corrupt. The attacker claims it is the secretary's fault and demands they send to the correct file.

Authority

Intimidation

Familiarity

Trust

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What social engineering tactic is being used here:

A scam website posts a fake advertisement for a product on social media. They then create a swathe of authentic-looking accounts to post comments under the post claiming how wonderful the product is.

Authority

Trust

Consensus

Familiarity

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What social engineering tactic is being used here:

A scam company posts on social media about a luxury car being sold cheaply. They state that only a handful of cars are available at this price.

Intimidation

Consensus

Scarcity

Trust

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What social engineering tactic is being used here:

An email contains false information that the user's computer is infected with malware and that they must download a program (which unknowingly contains the malware) within 20 minutes to clear the computer and save resources.

Urgency

Intimidation

Scarcity

Consensus

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What social engineering tactic is being used here:

An attacker imitates a close friend and strings the user along with genuine conversation to get to know them before asking them to download a file for them to print.

Authority

Intimidation

Urgency

Familiarity

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What social engineering tactic is being used here:

A cybercriminal disguised as a security expert calls the unsuspecting victim to offer advice. When helping the victim, the 'security expert' discovers a serious error that needs immediate attention. The solution provides the cybercriminal with the opportunity to violate the victim's security.

Trust

Familiarity

Urgency

Scarcity

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?