• 1. 
    You hack to steal data and to cause disruption to the company. What type of "hat" hacker are you?

  • Black
  • Grey
  • White
  • Red
  • 2. 
    You hack into companies and find bugs in their code and report this to the company. What type of "hat" hacker are you?

  • Black
  • Grey
  • White
  • Red
  • 3. 
    What is the term used to describe a fraudulent website that directs users to it?

  • Phishing
  • Pharming
  • 4. 
    What is the type of social engineering that promises goods in return for you entering your personal information?

  • Quid Pro Quo
  • Pretexting
  • Baiting
  • Phishing
  • 5. 
    How can you protect your PIN number at a cash machine from a criminal using "shoulder surfing"?

  • Cover your pin as you enter it
  • Use the cash machine in daylight
  • Get cash back from a shop
  • 6. 
    What type of social engineering involves the criminal pretending to be a delivery person, and they need to be let into the building?

  • Piggybacking
  • Shoulder Surfing
  • Pretexting
  • Phishing
  • 7. 
    You hack for fun, you cause no malicious damage. You may find a bug, but you won't report it. What type of "hat" hacker are you?

  • Black
  • Grey
  • White
  • Green
  • 8. 
    What type of social engineering involves the criminal to pretend to be someone they are not?

  • Quid Pro Quo
  • Baiting
  • Pretexting
  • Shoulder Surfing
  • 9. 
    You have received an email that looks like it is from your bank. It is asking for your log in details and PIN number. What type of social engineering is this?

  • Phishing
  • Pharming
  • Pretexting
  • Quid Pro Quo
  • 10. 
    You receive a phonecall from Microsoft Windows, saying that if you give them remote access they can upgrade your version of windows for free! What type of social engineering is this?

  • Quid Pro Quo
  • Baiting
  • Pretexting
  • Piggybacking
  • 11. 
    Which of the following describe 'Social engineering'?

  • Confusing people so they give-up information
  • Manipulating people to give-up information
  • Assaulting people so they give up information
  • Both A & B
  • 12. 
    A set of methods used by cyber criminals to deceive individuals into handing over information that they can use for fraudulent purposes’ is a definition of what?

  • Pretexting
  • Shoulder Surfing
  • Phishing
  • Social Engineering
  • 13. 
    An I.T. support technician might offer to remove a suspected virus, in return for remote access to your computer. They help initially, but the trick comes later. This is a form of....

  • Quid Pro Quo
  • Baiting
  • Pharming
  • Shoulder Surfing
  • 14. 
    If someone leaves a USB memory sticks lying around which contain malwares they are taking part in.....

  • Shoulder Surfing
  • Pharming
  • Baiting
  • Phishing
  • 15. 
    Which of the following most closely matches the definition of 'Pretexting'?

  • Sending an e-mail to a user pretending to be someone else
  • Hacking a person's computer
  • Tricking a person into revealing some personal information
  • Observing a legitimate user entering a password
  • Setting up a fake website that looks like an official website
  • 16. 
    What type of social engineering involves the attacker offering something, like a favour, in exchange for access to some personal information?

  • Quid Pro Quo
  • Pharming
  • Shoulder Surfing
  • Phishing
  • 17. 
    This involves tempting someone with an offer which is hiding the true consequences.

  • Baiting
  • Quid Pro Quo
  • Tailgating
  • Shoulder Surfing
  • 18. 
    What do email programs usually have built in to protect against phishing?

  • Anti-Phishing features
  • Anti-Virus software
  • Anti-Malware software
  • Anti-Pharming features
  • 19. 
    What is one way somebody could protect themselves from shoulder surfing?

  • share your pin with someone you trust
  • create a pin that is easy to remember
  • have a pin that is the same as your friends
  • be aware of who is around you
  • 20. 
    This email is what type of attack?

  • Shouldering
  • Blagging
  • Phishing
  • Hacking
Report Question
warning
access_time
  Time