Quiz: Threats - Social Engineering
Cambridge Nationals IT Level 1/Level 2
Ready to start this lesson?
Sign in to track your progress. 12 steps including 10 interactive questions.
Sign In to Start LearningStudents also studied
Browse allSteps in this lesson (12)
Building on what you've learned about other IT threats like DoS and malware, let's explore social engineering!
What is social engineering in the context of cyber-security?
Start the lesson to answer this multiple choice question
Which of the following are examples of social engineering attacks? (Select all that apply)
Start the lesson to answer this multi-select question
An attacker pretending to be someone you trust in order to trick you into sharing sensitive information is called {{blank0}}.
Start the lesson to answer this fill in the blank question
Match the items on the left with their correct pairs on the right
Start the lesson to answer this matching question
A fake message intended to trick someone into clicking a link or sharing personal information is known as {{blank0}}.
Start the lesson to answer this fill in the blank question
What is the best way to prevent shoulder surfing?
Start the lesson to answer this multiple choice question
Which of the following are signs of a phishing email? (Select all that apply)
Start the lesson to answer this multi-select question
Match the items on the left with their correct pairs on the right
Which methods can help prevent social engineering attacks? (Select all that apply)
Start the lesson to answer this multi-select question
What is the primary goal of social engineering?
Start the lesson to answer this multiple choice question
Match the items on the left with their correct pairs on the right
Start the lesson to answer this matching question

Want to Learn More?
Get personalised lessons, quizzes, and instant feedback from your AI tutor.
Explore More Topics