
Social engineering
Quiz by GCSE Computer Science Teacher 3
GCSE (AQA)
Computer Science
English National Curriculum
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measures 1 skill from
Measures 1 skill from
Track each student's skills and progress in your Mastery dashboards
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
14 questions
Show answers
- Q1What is social engineering?The art of engineering people of society to follow a cause of your choiceThe art of making your social media profile serve a business purposeThe use of community based computing projectsThe art of manipulating or ‘conning’ individuals into giving away private information or login IDs and passwords60s3.6.1.d
- Q2Which of these is not an example of social engineering?PhishingA Trojan HorseShoulder SurfingVishing45s3.6.1.d
- Q3What is shoulder surfing?Of observing patterns in society for your gainShouldering involves direct observation of a user entering their security detailsConning people into giving you their detailsSending out emails that contain viruses30s3.6.1.d
- Q4What is phishing?A cyber attack intended to redirect a website's traffic to anotherYou are tricked into handing over sensitive or personal information via emailDirect observation of a user entering their security detailsYou knowingly hand over sensitive or personal information (login details, bank details, etc.)30s3.6.1.d
- Q5What is vishing?Knowingly giving out your personal information to a trusted sourceA cyber attack intended to redirect a websites traffic to another fake siteWhen you are tricked into giving your personal information out over the phoneWhen are tricked into giving your personal information out via an email or web-page45s3.6.1.d
- Q6What is pharming?A cyber attack intended to redirect a website's traffic to another, fake siteA trick to get you handing over sensitive or personal information (login details, bank details, etc.)A method of filtering web servicesDirect observation of a user entering their security details60s3.6.1.d
- Q7In which of these situations should you be cautious when opening an email?When it is from your mother in lawWhen is it from a known senderWhen it is received late at nightWhen it is from an unknown sender60s3.6.1.d
- Q8Which of the following is not a preventative measure against phishing email scams?Being vigilant against any suspicious activityUsing a SPAM filterClicking on any links to see where they take youDeleting emails that looks suspicious45s3.6.1.d
- Q9What types of people have been a victim of social engineering crimes?Elderly peopleCyber specialistsYoung tech savvy peopleAll of these45s3.6.1.d
- Q10How can you check if a web-page is legitimate before signing in or entering sensitive information?Look for the HTTPS at the start of the URLJudge how well designed the website isCheck if its customer service information is listedIf the site is a well known site, it will have to be legitimate45s3.6.1.d
- Q11How can you protect yourself from vishing?Check that the caller can confirm your postcode or emailUse private caller ID when calling companiesOnly answer numbers that are not private or withheldDo not give out bank account or sensitive information to incoming calls45s3.6.1.d
- Q12What is the name for a social engineering technique in which a fictional situation is created to obtain personal information from someone?VishingShoulder SurfingBlaggingPhishing45s3.6.1.d
- Q13In what situation are you safe from social engineering?When using a VPNNeitherBothAt school or work45s3.6.1.d
- Q14Why are employees the biggest risk to a companies network?They will not always check removable hardware before plugging itAll of these reasonsThey will not think to keep their passwords secure from shoulder surfersThey will often open emails without checking45s3.6.1.d