Q.1
Which of the following statements is true?
  • Emails that request sensitive information of any sort should be treated with skepticism.
  • Emails from your boss and other co-workers can always be trusted.
  • Emails with spammy content are harmless.
  • Emails containing attachments are usually malicious.
Q.2
What is phishing?
  • The use of email to obtain personal information or install malicious files or programs .
  • A pasttime or hobby that involves a rod and bait.
Q.3
What is social engineering?
  • The use of human psychology and deception to gain access to confidential information.
  • The ability to plan a fantastic party.
Q.4
What is tailgating?
  • Following an employee into a secure location.
  • Hanging out with friends before the big game.
Q.5
What is baiting?
  • A real-world ‘Trojan Horse’ that uses physical media, such as a flash key, and relies on the curiosity of the victim.
  • Preparing to fish.
Q.6
What is quid pro quo?
  • Promising a free gift or service in exchange for information.
  • An ancient Greek game.
Q.7
A person wearing a uniform and a badge, indicating they’re with a printer repair company, is sitting unsupervised at a coworker’s desk. They seem to be looking through the files and documents that are visible on that machine. It seems suspicious, so you ask if they need some assistance. They tell you that the printer is having problems, so they were looking for a file they could print, to diagnose the problem better. Which of the following is the biggest red flag in this scenario?
  • They are looking through the files on the system.
  • There is a repair person wearing a uniform.
  • They are trying to diagnose a problem with a printer.
  • They are sitting unescorted at a coworker's desk.
Q.8
Your manager is attending a meeting that is out of town. You receive a text message from her late at night indicating she lost her purse and asking you to urgently send her some funds until she can get to the bank in the morning. Which of the following is the biggest red flag in this scenario?
  • Your manager urgently needs you to send her money.
  • Your manager has to go to the bank in the morning.
  • Your manager is sending you a message late at night.
  • Your manager is attending a meeting that is out of town.
Q.9
You receive a generic email notification about an issue with the delivery of a recent order. You’re instructed to click on a link included in the email for further information about the order. When you click, it opens a webpage which asks for your account username and password before you can view the information. Which of the following is the biggest red flag in this scenario?
  • There is an issue while delivering your order.
  • The email you received was a generic notification.
  • The information about the delivery problems is not contained in the email.
  • Your username and password are required to view the information.
Q.10
You receive an email from an online music service you subscribe to. The message indicates there was a problem while processing a recent payment. It also says your account will be deactivated if you don’t update your payment information withinminutes of reading this message. The bottom of the message includes a reassuring notification that the included link has been scanned and is clean of any viruses. Which of the following is the biggest red flag in this scenario?
  • There was a problem with processing a recent payment.
  • You received an email from your online music service.
  • The included link was scanned for viruses.
  • You'll have to act with 60 minutes of reading the message.
Q.11
You receive a call from “Credit Services.” The person on the line compliments you on your great credit history and also informs you that you have qualified for a card with better features and a lower rate. They’ll only need a few minutes of your time to go over some personal information before they can get the card out to you. Which of the following is the biggest red flag in this scenario?
  • You'll have to provide personal information.
  • They'll only need a few minutes of your time.
  • You have qualified for a credit card.
  • You received a call from "Credit Services."
Q.12
Someone from the IT department calls you and states that he needs your username and password so the can run an update on your computer. How should you handle this situation?
  • Promptly end the phone call and report the incident to management.
  • Tell him you'll email your username and password to the IT department because that's a safer form of communication.
  • Give him your username and password since updates are a crucial part of security.
  • Put him on hold and ask your co-worker if their computer has been updated.
Q.13
What is pretexting?
  • Pretending to be someone else to gain access to information, either in person or by phone.
  • Planning an important text message before sending.
Q.14
Fake emails can be an example of what?
  • Phishing
  • Shouldering
Q.15
If someone leaves a USB memory sticks lying around which contain malwares they are taking part in.....
  • Shoulder Surfing
  • Pharming
  • Baiting
  • Phishing
Q.16
Which of the following is not a social engineering technique?
  • Blagging
  • Hacking
  • Phishing
  • Pharming
Q.17
Which of these is not a type of malware?
  • Hacking
  • Denial of service attack
  • Pharming
  • Worm
Q.18
Which type of malware stops a user by asking for password confirmation and stealing personal data?
  • Adware
  • Spyware
  • Trojan
  • Denial of Service Attack
  • Worm
Q.19
Which social network is considered the most popular for social media marketing
  • LinkedIn
  • Tumblr
  • SMM
  • Facebook
  • Twitter
Q.20
Which of the following describe 'Social engineering'?
  • Confusing people so they give-up information
  • Manipulating people to give-up information
  • Assaulting people so they give up information
  • Both A & B
0 h : 0 m : 1 s