
Social Engineering Tactics
Authored by Lewis Weeden
Computers
12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What social engineering tactic is being used here:
An attacker pretends to be the company's CEO and provides an employee a PDF to open. The employee trusts the CEO and opens the PDF which contains malware.
Authority
Intimidation
Familiarity
Urgency
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What social engineering tactic is being used here:
A secretary receives a call from an attacker claiming that their boss is about to give a presentation and the file they provided is corrupt. The attacker claims it is the secretary's fault and demands they send to the correct file.
Authority
Intimidation
Familiarity
Trust
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What social engineering tactic is being used here:
A scam website posts a fake advertisement for a product on social media. They then create a swathe of authentic-looking accounts to post comments under the post claiming how wonderful the product is.
Authority
Trust
Consensus
Familiarity
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What social engineering tactic is being used here:
A scam company posts on social media about a luxury car being sold cheaply. They state that only a handful of cars are available at this price.
Intimidation
Consensus
Scarcity
Trust
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What social engineering tactic is being used here:
An email contains false information that the user's computer is infected with malware and that they must download a program (which unknowingly contains the malware) within 20 minutes to clear the computer and save resources.
Urgency
Intimidation
Scarcity
Consensus
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What social engineering tactic is being used here:
An attacker imitates a close friend and strings the user along with genuine conversation to get to know them before asking them to download a file for them to print.
Authority
Intimidation
Urgency
Familiarity
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What social engineering tactic is being used here:
A cybercriminal disguised as a security expert calls the unsuspecting victim to offer advice. When helping the victim, the 'security expert' discovers a serious error that needs immediate attention. The solution provides the cybercriminal with the opportunity to violate the victim's security.
Trust
Familiarity
Urgency
Scarcity
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
emtech
Quiz
•
12th Grade
11 questions
Types of Mass Media
Quiz
•
10th Grade - Professi...
10 questions
ITS Quiz 1
Quiz
•
10th - 12th Grade
10 questions
Software Design and Development Quick Quiz 2
Quiz
•
11th - 12th Grade
11 questions
Technology Morning Tea Quiz
Quiz
•
KG - Professional Dev...
12 questions
1.6 Ejemplo de aplicación Web
Quiz
•
12th Grade
10 questions
Isi saja
Quiz
•
12th Grade
10 questions
ICT as Platform for Change
Quiz
•
11th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade