ClassQuiz
Play
Explore
Search
Docs
GitHub
Register
Log in
Donate
❤️
ClassQuiz
Play
Phishing Quiz
Total questions: 10
Made by
@kyan
0
0
6
310
View on the original
Practice
Download
Report
Social engineering bypasses all security efforts put forth by the IT and security departments via
1: Social engineering bypasses all security efforts put forth by the IT and security departments via
20s
Breaking encryption
Cracking through the network firewalls
The employees
none of above
What can be at risk if social engineer gains access to your company’s network or to your specific computer?
2: What can be at risk if social engineer gains access to your company’s network or to your specific computer?
20s
Work documents stored on your work computer or on the network
Personal documents stored on your work computer
Personal email access via your work computer
All of the above
What is the scams by pretending to be a legitimate business that you may have an account with?
3: What is the scams by pretending to be a legitimate business that you may have an account with?
20s
Phishing
Cracking
Virus
Encryption
Social engineering affects you outside of work.
4: Social engineering affects you outside of work.
10s
True
False
Only obvious criminals could be social engineers, not someone I know and work with on a regular basis.
5: Only obvious criminals could be social engineers, not someone I know and work with on a regular basis.
20s
True
False
An ex-employee could potentially turn into a social engineer.
6: An ex-employee could potentially turn into a social engineer.
20s
True
False
What is the weakest link in security?
7: What is the weakest link in security?
20s
Physical security (e.g. cameras, locks, guards)
Technological security (e.g. firewalls, encryption)
Employees (e.g. the people who use the systems)
What is the technique where the attacker pretends to be someone they are not or invents a scenario to engage
8: What is the technique where the attacker pretends to be someone they are not or invents a scenario to engage
20s
Phishing
Pretexting
Dumpster diving
Sniffing
You receive a phishing email, but when are you at risk?
9: You receive a phishing email, but when are you at risk?
20s
When it’s in your inbox
When you open the email
When you click on a link
When you delete the email
How can you check whether an email is authentic?
10: How can you check whether an email is authentic?
20s
Check the sender, hover over the email address /link
Check the date it was sent, make sure it was sent 9am – 5pm
Check whether it uses images
All of the above