E-safety Summative Assessment

E-safety Summative Assessment

6th Grade

30 Qs

quiz-placeholder

Similar activities

History of/ All About Technology

History of/ All About Technology

5th - 9th Grade

26 Qs

Computer Basics

Computer Basics

6th - 8th Grade

25 Qs

computer

computer

5th - 8th Grade

25 Qs

Computer Vocabulary

Computer Vocabulary

3rd - 6th Grade

25 Qs

Computer Terms

Computer Terms

6th - 8th Grade

25 Qs

Grade 6 computer quiz

Grade 6 computer quiz

6th Grade

25 Qs

computer viruses

computer viruses

5th - 10th Grade

26 Qs

Basic Computers

Basic Computers

KG - Professional Development

25 Qs

E-safety Summative Assessment

E-safety Summative Assessment

Assessment

Quiz

Computers

6th Grade

Hard

Created by

Georgios Kakavelakis

Used 2+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is social engineering?

A method used by cybercriminals to deceive individuals into handing over information

A type of attack that steals a victim's password or sensitive data

An attack in which the victim receives an email disguised as a reputable source

An attack in which the perpetrator invents a scenario to convince the victim to give them data or money

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which of the following is an example of shouldering?

Watching someone enter their PIN at a cash machine

Sending a phishing email to trick someone into giving up valuable data

Asking someone to complete a short quiz to find out their name

Inventing a scenario to convince someone to give them data or money

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is a phishing attack?

An attack in which the victim receives an email disguised as a reputable source

A method used by cybercriminals to deceive individuals into handing over information

An attack in which the perpetrator invents a scenario to convince the victim to give them data or money

Watching someone enter their PIN at a cash machine

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is blagging?

Watching someone enter their PIN at a cash machine

Sending a phishing email to trick someone into giving up valuable data

Inventing a scenario to convince someone to give them data or money

An attack in which the perpetrator invents a scenario to convince the victim to give them data or money

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What makes an email suspicious in the context of blagging?

Suspicious code in email

Spelling mistakes

Unusual use of English

All of the above

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is the difference between phishing and blagging?

Phishing involves watching someone enter their PIN, while blagging involves sending deceptive emails

Phishing is an attack in which the victim receives an email, while blagging is an attack in which the perpetrator invents a scenario

Phishing is a method used by cybercriminals, while blagging is a type of attack to steal sensitive data

Phishing is an attack in which the victim receives an email disguised as a reputable source, while blagging is an attack in which the perpetrator invents a scenario to convince the victim

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which technique involves criminals creating a false scenario to extract sensitive information?

Shoulder surfing

Baiting

Blagging

Dumpster diving

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?