Social Engineering Unit Review

Social Engineering Unit Review

10th Grade

22 Qs

quiz-placeholder

Similar activities

Year 9 Cyber security

Year 9 Cyber security

9th - 12th Grade

23 Qs

Effects and Security of ICT

Effects and Security of ICT

9th - 10th Grade

25 Qs

ICT Quiz part 1

ICT Quiz part 1

10th Grade

20 Qs

Kuis Validitas Sumber Data

Kuis Validitas Sumber Data

10th Grade

20 Qs

CSP AP MT Review 2024

CSP AP MT Review 2024

9th - 12th Grade

20 Qs

032_Cross-site Scripting – CompTIA Security+ SY0-701 – 2.3

032_Cross-site Scripting – CompTIA Security+ SY0-701 – 2.3

9th Grade - University

20 Qs

029_Malicious Updates – CompTIA Security+ SY0-701 – 2.3

029_Malicious Updates – CompTIA Security+ SY0-701 – 2.3

9th - 12th Grade

20 Qs

analisis data

analisis data

10th Grade

20 Qs

Social Engineering Unit Review

Social Engineering Unit Review

Assessment

Quiz

Computers

10th Grade

Hard

Created by

Rob Breshears

FREE Resource

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Which of the following is a cybercrime tactic used to deceive individuals into providing sensitive information like usernames and passwords?

Typosquatting

Phishing

Watering Hole Attack

Clickjacking

2.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

A social engineering principle where the attacker pretends to be a person of importance, like a police officer, is known as:

Scarcity

Urgency

Authority

Trust

3.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Exploiting a user's misspelling of a website, such as typing "facbook.com" instead of "facebook.com," is an example of what?

Whaling

Vishing

Smishing

Typosquatting

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

What type of phishing attack is directed at a high-profile target, such as a CEO?

Spear phishing

Whaling

Spam

Clone phishing

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Which of the following involves an attacker stealing the cookie used to authenticate a user on a website?

Session Hijacking

Credential Harvesting

Clickjacking

Business Email Compromise

6.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Intentionally spreading false information with the purpose of causing harm or confusion is known as:

Misinformation

A hoax

Disinformation

Impersonation

7.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

A "watering hole" attack is a metaphor for what?

Flooding a user's inbox with spam emails.

A place online that users frequently visit for information or resources.

A physical location where hackers gather.

An attack that uses a sense of urgency to trick victims.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?