Quiz - Garden State Cyber Unit 2 - Human Factors

Quiz - Garden State Cyber Unit 2 - Human Factors

14 Qs

quiz-placeholder

Similar activities

Law and Justice Practice Assessment

Law and Justice Practice Assessment

KG - University

18 Qs

Email Policy Quiz

Email Policy Quiz

KG - University

15 Qs

Cybersecurity quiz

Cybersecurity quiz

6th - 8th Grade

10 Qs

Practice Quiz 7-2

Practice Quiz 7-2

KG - University

10 Qs

GRADE 5

GRADE 5

5th Grade

11 Qs

Feudalism, Black Death, Renaissance Quiz

Feudalism, Black Death, Renaissance Quiz

9th - 12th Grade

10 Qs

Quiz - Garden State Cyber Unit 2 - Human Factors

Quiz - Garden State Cyber Unit 2 - Human Factors

Assessment

Quiz

others

Easy

Created by

Brian Hise

Used 2+ times

FREE Resource

14 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 2 pts

Which two of the following step of hacking are most likely to involve the use of social engineering? (pick 2)
Recon / footprinting
Gaining Access
Scanning / Probing
Escalating Privileges
Exploiting

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What is the goal of social engineering?
To make people behave better
To help people make more friends
To get an authorized user to give information to an unauthorized person
To have an unauthorized user to determine a user's password using brute force

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What is the main method used in social engineering?
Brute Force
Deception
Complex Algorithms
Ransom attacks

4.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Which is NOT a reason that Social Engineering is so successful?
Humans want to be helpful
Humans make sloppy mistakes
Humans want to avoid confrontation
Humans are good at problem solving

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Which of the following Social Engineering techniques are best protected against by use of a security guard or turnstile?
Piggybacking
Shoulder Surfing
Dumpster Diving
Baiting

6.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

This is considered the single biggest threat in the digital world and was used in 67% of cyber attacks last year?
Dumpster Diving
Piggybacking
Shoulder Surfing
Phishing

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Which of the following is NOT an indication that the email might be a phishing email?
Misspellings
Email was sent in the middle of the night
Sender and email address don't match
URL doesn't match the text

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?