What social engineering tactic is being used here:
An attacker pretends to be the company's CEO and provides an employee a PDF to open. The employee trusts the CEO and opens the PDF which contains malware.
Social Engineering Tactics
Quiz
•
Computers
•
12th Grade
•
Hard
Lewis Weeden
Used 1+ times
FREE Resource
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What social engineering tactic is being used here:
An attacker pretends to be the company's CEO and provides an employee a PDF to open. The employee trusts the CEO and opens the PDF which contains malware.
Authority
Intimidation
Familiarity
Urgency
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What social engineering tactic is being used here:
A secretary receives a call from an attacker claiming that their boss is about to give a presentation and the file they provided is corrupt. The attacker claims it is the secretary's fault and demands they send to the correct file.
Authority
Intimidation
Familiarity
Trust
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What social engineering tactic is being used here:
A scam website posts a fake advertisement for a product on social media. They then create a swathe of authentic-looking accounts to post comments under the post claiming how wonderful the product is.
Authority
Trust
Consensus
Familiarity
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What social engineering tactic is being used here:
A scam company posts on social media about a luxury car being sold cheaply. They state that only a handful of cars are available at this price.
Intimidation
Consensus
Scarcity
Trust
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What social engineering tactic is being used here:
An email contains false information that the user's computer is infected with malware and that they must download a program (which unknowingly contains the malware) within 20 minutes to clear the computer and save resources.
Urgency
Intimidation
Scarcity
Consensus
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What social engineering tactic is being used here:
An attacker imitates a close friend and strings the user along with genuine conversation to get to know them before asking them to download a file for them to print.
Authority
Intimidation
Urgency
Familiarity
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What social engineering tactic is being used here:
A cybercriminal disguised as a security expert calls the unsuspecting victim to offer advice. When helping the victim, the 'security expert' discovers a serious error that needs immediate attention. The solution provides the cybercriminal with the opportunity to violate the victim's security.
Trust
Familiarity
Urgency
Scarcity
10 questions
CompTIA Practice Questions
Quiz
•
12th Grade
6 questions
Unit 3 - 2.3.1 Application Vulnerabilitites
Quiz
•
9th Grade - University
9 questions
Quiz - Garden State Cyber Unit 2.1
Quiz
•
9th - 12th Grade
11 questions
19. Cybersecurity Social Engineering Threats Quiz
Quiz
•
9th - 12th Grade
6 questions
Career Pathways
Quiz
•
KG - University
12 questions
CamTech Network Security
Quiz
•
8th - 12th Grade
9 questions
Past paper Jan/2022
Quiz
•
9th - 12th Grade
10 questions
Network Security Quiz
Quiz
•
12th Grade
15 questions
Multiplication Facts
Quiz
•
4th Grade
20 questions
Math Review - Grade 6
Quiz
•
6th Grade
20 questions
math review
Quiz
•
4th Grade
5 questions
capitalization in sentences
Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance
Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions
Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines
Quiz
•
Professional Development
12 questions
Dividing Fractions
Quiz
•
6th Grade