
E-safety Summative Assessment
Authored by Georgios Kakavelakis
Computers
6th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is social engineering?
A method used by cybercriminals to deceive individuals into handing over information
A type of attack that steals a victim's password or sensitive data
An attack in which the victim receives an email disguised as a reputable source
An attack in which the perpetrator invents a scenario to convince the victim to give them data or money
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of shouldering?
Watching someone enter their PIN at a cash machine
Sending a phishing email to trick someone into giving up valuable data
Asking someone to complete a short quiz to find out their name
Inventing a scenario to convince someone to give them data or money
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a phishing attack?
An attack in which the victim receives an email disguised as a reputable source
A method used by cybercriminals to deceive individuals into handing over information
An attack in which the perpetrator invents a scenario to convince the victim to give them data or money
Watching someone enter their PIN at a cash machine
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is blagging?
Watching someone enter their PIN at a cash machine
Sending a phishing email to trick someone into giving up valuable data
Inventing a scenario to convince someone to give them data or money
An attack in which the perpetrator invents a scenario to convince the victim to give them data or money
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What makes an email suspicious in the context of blagging?
Suspicious code in email
Spelling mistakes
Unusual use of English
All of the above
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the difference between phishing and blagging?
Phishing involves watching someone enter their PIN, while blagging involves sending deceptive emails
Phishing is an attack in which the victim receives an email, while blagging is an attack in which the perpetrator invents a scenario
Phishing is a method used by cybercriminals, while blagging is a type of attack to steal sensitive data
Phishing is an attack in which the victim receives an email disguised as a reputable source, while blagging is an attack in which the perpetrator invents a scenario to convince the victim
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which technique involves criminals creating a false scenario to extract sensitive information?
Shoulder surfing
Baiting
Blagging
Dumpster diving
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?