Social Engineering Tactics

Social Engineering Tactics

12th Grade

7 Qs

quiz-placeholder

Similar activities

G11 IT Security L2

G11 IT Security L2

12th Grade

10 Qs

Unit 3 - 2.3.1 Application Vulnerabilitites

Unit 3 - 2.3.1 Application Vulnerabilitites

9th Grade - University

6 Qs

19. Cybersecurity Social Engineering Threats Quiz

19. Cybersecurity Social Engineering Threats Quiz

9th - 12th Grade

11 Qs

Principles of Social Engineering

Principles of Social Engineering

10th - 12th Grade

10 Qs

CCST Attacks and Threats - Chapter 19

CCST Attacks and Threats - Chapter 19

9th - 12th Grade

8 Qs

Cyber security

Cyber security

12th Grade

10 Qs

Rainbow six siege

Rainbow six siege

5th - 12th Grade

8 Qs

Cisco CCST Objective 1

Cisco CCST Objective 1

12th Grade

10 Qs

Social Engineering Tactics

Social Engineering Tactics

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Lewis Weeden

Used 1+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What social engineering tactic is being used here:

An attacker pretends to be the company's CEO and provides an employee a PDF to open. The employee trusts the CEO and opens the PDF which contains malware.

Authority

Intimidation

Familiarity

Urgency

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What social engineering tactic is being used here:

A secretary receives a call from an attacker claiming that their boss is about to give a presentation and the file they provided is corrupt. The attacker claims it is the secretary's fault and demands they send to the correct file.

Authority

Intimidation

Familiarity

Trust

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What social engineering tactic is being used here:

A scam website posts a fake advertisement for a product on social media. They then create a swathe of authentic-looking accounts to post comments under the post claiming how wonderful the product is.

Authority

Trust

Consensus

Familiarity

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What social engineering tactic is being used here:

A scam company posts on social media about a luxury car being sold cheaply. They state that only a handful of cars are available at this price.

Intimidation

Consensus

Scarcity

Trust

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What social engineering tactic is being used here:

An email contains false information that the user's computer is infected with malware and that they must download a program (which unknowingly contains the malware) within 20 minutes to clear the computer and save resources.

Urgency

Intimidation

Scarcity

Consensus

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What social engineering tactic is being used here:

An attacker imitates a close friend and strings the user along with genuine conversation to get to know them before asking them to download a file for them to print.

Authority

Intimidation

Urgency

Familiarity

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What social engineering tactic is being used here:

A cybercriminal disguised as a security expert calls the unsuspecting victim to offer advice. When helping the victim, the 'security expert' discovers a serious error that needs immediate attention. The solution provides the cybercriminal with the opportunity to violate the victim's security.

Trust

Familiarity

Urgency

Scarcity