Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
14 questions
Show answers
  • Q1
    What is social engineering?
    The art of engineering people of society to follow a cause of your choice
    The art of making your social media profile serve a business purpose
    The use of community based computing projects
    The art of manipulating or ‘conning’ individuals into giving away private information or login IDs and passwords
    60s
    3.6.1.d
  • Q2
    Which of these is not an example of social engineering?
    Phishing
    A Trojan Horse
    Shoulder Surfing
    Vishing
    45s
    3.6.1.d
  • Q3
    What is shoulder surfing?
    Of observing patterns in society for your gain
    Shouldering involves direct observation of a user entering their security details
    Conning people into giving you their details
    Sending out emails that contain viruses
    30s
    3.6.1.d
  • Q4
    What is phishing?
    A cyber attack intended to redirect a website's traffic to another
    You are tricked into handing over sensitive or personal information via email
    Direct observation of a user entering their security details
    You knowingly hand over sensitive or personal information (login details, bank details, etc.)
    30s
    3.6.1.d
  • Q5
    What is vishing?
    Knowingly giving out your personal information to a trusted source
    A cyber attack intended to redirect a websites traffic to another fake site
    When you are tricked into giving your personal information out over the phone
    When are tricked into giving your personal information out via an email or web-page
    45s
    3.6.1.d
  • Q6
    What is pharming?
    A cyber attack intended to redirect a website's traffic to another, fake site
    A trick to get you handing over sensitive or personal information (login details, bank details, etc.)
    A method of filtering web services
    Direct observation of a user entering their security details
    60s
    3.6.1.d
  • Q7
    In which of these situations should you be cautious when opening an email?
    When it is from your mother in law
    When is it from a known sender
    When it is received late at night
    When it is from an unknown sender
    60s
    3.6.1.d
  • Q8
    Which of the following is not a preventative measure against phishing email scams?
    Being vigilant against any suspicious activity
    Using a SPAM filter
    Clicking on any links to see where they take you
    Deleting emails that looks suspicious
    45s
    3.6.1.d
  • Q9
    What types of people have been a victim of social engineering crimes?
    Elderly people
    Cyber specialists
    Young tech savvy people
    All of these
    45s
    3.6.1.d
  • Q10
    How can you check if a web-page is legitimate before signing in or entering sensitive information?
    Look for the HTTPS at the start of the URL
    Judge how well designed the website is
    Check if its customer service information is listed
    If the site is a well known site, it will have to be legitimate
    45s
    3.6.1.d
  • Q11
    How can you protect yourself from vishing?
    Check that the caller can confirm your postcode or email
    Use private caller ID when calling companies
    Only answer numbers that are not private or withheld
    Do not give out bank account or sensitive information to incoming calls
    45s
    3.6.1.d
  • Q12
    What is the name for a social engineering technique in which a fictional situation is created to obtain personal information from someone?
    Vishing
    Shoulder Surfing
    Blagging
    Phishing
    45s
    3.6.1.d
  • Q13
    In what situation are you safe from social engineering?
    When using a VPN
    Neither
    Both
    At school or work
    45s
    3.6.1.d
  • Q14
    Why are employees the biggest risk to a companies network?
    They will not always check removable hardware before plugging it
    All of these reasons
    They will not think to keep their passwords secure from shoulder surfers
    They will often open emails without checking
    45s
    3.6.1.d

Teachers give this quiz to your class