14.5.2 - Quiz on Social Engineering Attacks

14.5.2 - Quiz on Social Engineering Attacks

10th Grade

15 Qs

quiz-placeholder

Similar activities

WJEC GCSE ICT Unit 1 E-Mail

WJEC GCSE ICT Unit 1 E-Mail

9th - 10th Grade

13 Qs

024_Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2

024_Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2

9th Grade - University

20 Qs

(L2) 1.4 Network Security

(L2) 1.4 Network Security

10th Grade

19 Qs

J808 4.1 Types of threats

J808 4.1 Types of threats

9th - 11th Grade

20 Qs

Internet Security

Internet Security

3rd - 10th Grade

19 Qs

Cyber Security KS4

Cyber Security KS4

8th - 12th Grade

15 Qs

SQL Injection

SQL Injection

10th Grade

10 Qs

IGCSE Comp Sci -  Security revision

IGCSE Comp Sci - Security revision

9th - 11th Grade

10 Qs

14.5.2 - Quiz on Social Engineering Attacks

14.5.2 - Quiz on Social Engineering Attacks

Assessment

Quiz

Computers

10th Grade

Easy

Created by

Brian Bass

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of a phishing attack?

To perform a denial of service attack

To gain physical access to a building

To send spam emails

To trick users into clicking malicious links

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a characteristic of spear phishing?

It is targeted and well-researched

It is a generic email

It targets a large number of people

It involves physical interaction

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an evil twin attack?

An attack that involves eavesdropping on conversations

An attack that involves sending phishing emails

An attack that uses a rogue access point to mimic a legitimate network

An attack that involves impersonating a legitimate user

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best defense against phishing attacks?

Installing antivirus software

Encrypting emails

User training

Using a firewall

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does tailgating involve?

Sending fake emails

Listening to private conversations

Following someone into a restricted area

Creating a fake website

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can users prevent tailgating?

By using privacy screens

By encrypting their data

By being aware of their surroundings

By using strong passwords

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main tactic used in vishing attacks?

Sending emails

Using high-pressure tactics over the phone

Creating fake websites

Physically following someone

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?