
Social Engineering Tactics

Quiz
•
Computers
•
12th Grade
•
Hard
Lewis Weeden
Used 1+ times
FREE Resource
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What social engineering tactic is being used here:
An attacker pretends to be the company's CEO and provides an employee a PDF to open. The employee trusts the CEO and opens the PDF which contains malware.
Authority
Intimidation
Familiarity
Urgency
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What social engineering tactic is being used here:
A secretary receives a call from an attacker claiming that their boss is about to give a presentation and the file they provided is corrupt. The attacker claims it is the secretary's fault and demands they send to the correct file.
Authority
Intimidation
Familiarity
Trust
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What social engineering tactic is being used here:
A scam website posts a fake advertisement for a product on social media. They then create a swathe of authentic-looking accounts to post comments under the post claiming how wonderful the product is.
Authority
Trust
Consensus
Familiarity
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What social engineering tactic is being used here:
A scam company posts on social media about a luxury car being sold cheaply. They state that only a handful of cars are available at this price.
Intimidation
Consensus
Scarcity
Trust
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What social engineering tactic is being used here:
An email contains false information that the user's computer is infected with malware and that they must download a program (which unknowingly contains the malware) within 20 minutes to clear the computer and save resources.
Urgency
Intimidation
Scarcity
Consensus
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What social engineering tactic is being used here:
An attacker imitates a close friend and strings the user along with genuine conversation to get to know them before asking them to download a file for them to print.
Authority
Intimidation
Urgency
Familiarity
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What social engineering tactic is being used here:
A cybercriminal disguised as a security expert calls the unsuspecting victim to offer advice. When helping the victim, the 'security expert' discovers a serious error that needs immediate attention. The solution provides the cybercriminal with the opportunity to violate the victim's security.
Trust
Familiarity
Urgency
Scarcity
Similar Resources on Wayground
12 questions
M2 Social Engineering, Camb Nats

Quiz
•
9th - 12th Grade
6 questions
STREAM Focus - Smart speaker Design

Quiz
•
11th - 12th Grade
10 questions
Software Engineering: Defining the Problem

Quiz
•
12th Grade
11 questions
18. Cyber security Threats Quiz

Quiz
•
9th - 12th Grade
12 questions
CHANDRASHEEL VIDYAPEETH,KANTI,MUZ. [ROLE OF IT IN EDUCATION]

Quiz
•
9th - 12th Grade
10 questions
ICE BREAKER

Quiz
•
1st Grade - Professio...
10 questions
Cyber Security Quiz 1

Quiz
•
12th Grade
8 questions
CCST Security and Privacy Concepts - Chapter 18

Quiz
•
9th - 12th Grade
Popular Resources on Wayground
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World

Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
20 questions
ELA Advisory Review

Quiz
•
7th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns

Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade