Social Engineering Tactics

Social Engineering Tactics

12th Grade

7 Qs

quiz-placeholder

Similar activities

Ch 8.1 - System Hacking

Ch 8.1 - System Hacking

12th Grade

9 Qs

2.4 Targets for cyber security threats

2.4 Targets for cyber security threats

12th Grade

10 Qs

Episode 6: Influence and Persuasion

Episode 6: Influence and Persuasion

9th - 12th Grade

9 Qs

20. Cybersecurity Malware Quiz

20. Cybersecurity Malware Quiz

9th - 12th Grade

11 Qs

Threats to Data

Threats to Data

9th - 12th Grade

11 Qs

Warm-up 6

Warm-up 6

9th - 12th Grade

9 Qs

history of computer

history of computer

4th - 12th Grade

9 Qs

CSE Hammen

CSE Hammen

9th - 12th Grade

11 Qs

Social Engineering Tactics

Social Engineering Tactics

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Lewis Weeden

Used 1+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What social engineering tactic is being used here:

An attacker pretends to be the company's CEO and provides an employee a PDF to open. The employee trusts the CEO and opens the PDF which contains malware.

Authority

Intimidation

Familiarity

Urgency

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What social engineering tactic is being used here:

A secretary receives a call from an attacker claiming that their boss is about to give a presentation and the file they provided is corrupt. The attacker claims it is the secretary's fault and demands they send to the correct file.

Authority

Intimidation

Familiarity

Trust

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What social engineering tactic is being used here:

A scam website posts a fake advertisement for a product on social media. They then create a swathe of authentic-looking accounts to post comments under the post claiming how wonderful the product is.

Authority

Trust

Consensus

Familiarity

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What social engineering tactic is being used here:

A scam company posts on social media about a luxury car being sold cheaply. They state that only a handful of cars are available at this price.

Intimidation

Consensus

Scarcity

Trust

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What social engineering tactic is being used here:

An email contains false information that the user's computer is infected with malware and that they must download a program (which unknowingly contains the malware) within 20 minutes to clear the computer and save resources.

Urgency

Intimidation

Scarcity

Consensus

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What social engineering tactic is being used here:

An attacker imitates a close friend and strings the user along with genuine conversation to get to know them before asking them to download a file for them to print.

Authority

Intimidation

Urgency

Familiarity

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What social engineering tactic is being used here:

A cybercriminal disguised as a security expert calls the unsuspecting victim to offer advice. When helping the victim, the 'security expert' discovers a serious error that needs immediate attention. The solution provides the cybercriminal with the opportunity to violate the victim's security.

Trust

Familiarity

Urgency

Scarcity

Discover more resources for Computers