

Social Engineering Tactics and Techniques
Interactive Video
•
Computers, Business, Life Skills
•
9th - 12th Grade
•
Practice Problem
•
Hard
Amelia Wright
FREE Resource
Read more
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common tactic used in social engineering to gain trust?
Providing financial incentives
Offering free software
Communicating from multiple sources
Using technical jargon
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In a phishing attack, what is often imitated to deceive the victim?
A known contact
A popular website
A government agency
A news outlet
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the term for observing someone's screen to gain information?
Visual phishing
Screen peeking
Screen hacking
Shoulder surfing
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a recommended way to prevent shoulder surfing?
Sitting in a crowded area
Turning off the monitor
Using a larger screen
Using a privacy filter
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is spear phishing?
An attack involving malware
A targeted attack on specific individuals
An attack using fake websites
A broad attack on many users
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Who is typically targeted in a whaling attack?
Executives
IT staff
New employees
Security personnel
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the term 'tailgating' refer to in security?
Hacking into a secure network
Using a fake ID to enter a building
Following someone into a restricted area
Listening to private conversations
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?