Search Header Logo

E-safety Summative Assessment

Authored by Georgios Kakavelakis

Computers

6th Grade

Used 2+ times

E-safety Summative Assessment
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is social engineering?

A method used by cybercriminals to deceive individuals into handing over information

A type of attack that steals a victim's password or sensitive data

An attack in which the victim receives an email disguised as a reputable source

An attack in which the perpetrator invents a scenario to convince the victim to give them data or money

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which of the following is an example of shouldering?

Watching someone enter their PIN at a cash machine

Sending a phishing email to trick someone into giving up valuable data

Asking someone to complete a short quiz to find out their name

Inventing a scenario to convince someone to give them data or money

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is a phishing attack?

An attack in which the victim receives an email disguised as a reputable source

A method used by cybercriminals to deceive individuals into handing over information

An attack in which the perpetrator invents a scenario to convince the victim to give them data or money

Watching someone enter their PIN at a cash machine

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is blagging?

Watching someone enter their PIN at a cash machine

Sending a phishing email to trick someone into giving up valuable data

Inventing a scenario to convince someone to give them data or money

An attack in which the perpetrator invents a scenario to convince the victim to give them data or money

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What makes an email suspicious in the context of blagging?

Suspicious code in email

Spelling mistakes

Unusual use of English

All of the above

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is the difference between phishing and blagging?

Phishing involves watching someone enter their PIN, while blagging involves sending deceptive emails

Phishing is an attack in which the victim receives an email, while blagging is an attack in which the perpetrator invents a scenario

Phishing is a method used by cybercriminals, while blagging is a type of attack to steal sensitive data

Phishing is an attack in which the victim receives an email disguised as a reputable source, while blagging is an attack in which the perpetrator invents a scenario to convince the victim

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which technique involves criminals creating a false scenario to extract sensitive information?

Shoulder surfing

Baiting

Blagging

Dumpster diving

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?