
Cyber Security Investigate Vulnerabilities/Principles of Influence
Quiz by Robert
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
10 questions
Show answers
- Q1Which of the following principles of influence is most effective for persuading individuals to disclose sensitive information?AuthorityScarcitySocial ProofReciprocity30s
- Q2What type of vulnerability involves an attacker tricking a user into executing malicious actions by exploiting their trust?Cross-Site ScriptingBuffer OverflowSQL InjectionSocial Engineering30s
- Q3Which of the following is a common tactic used in social engineering to gain unauthorized access to sensitive information?PhishingDenial of ServiceMalware InjectionBrute Force Attack30s
- Q4What principle of influence relies on the idea that people are more likely to comply with requests from individuals they perceive as experts?CommitmentAuthorityConsistencyLiking30s
- Q5Which of the following best describes the practice of identifying and mitigating potential weaknesses in information systems?Firewall ConfigurationPenetration TestingIncident ResponseVulnerability Assessment30s
- Q6What behavioral principle explains why people are more likely to say yes to requests that align with their previous commitments?ReciprocityConsistencySocial ProofScarcity30s
- Q7In the context of social engineering, which technique involves using misleading information to manipulate users into providing confidential data?PretextingBaitingPharmingSpoofing30s
- Q8Which cyber security principle suggests that maintaining a least privilege access model can help minimize potential vulnerabilities?Defense in DepthSegregation of DutiesPrinciple of Least PrivilegeAccountability30s
- Q9What form of manipulation involves advertising a product as being in limited supply to increase its perceived value?AuthorityConsensusReciprocityScarcity30s
- Q10Which of the following best describes a method used by attackers to gain unauthorized access through misleading communications?MalwarePhishingRootkitRansomware30s