• 1. 
    You hack to steal data and to cause disruption to the company. What type of "hat" hacker are you?

  • Black
  • Grey
  • White
  • Red
  • 2. 
    True or False: You can always tell the difference between a real website and a fake pharming website?

  • true
  • false
  • 3. 
    You hack into companies and find bugs in their code and report this to the company. What type of "hat" hacker are you?

  • Black
  • Grey
  • White
  • Red
  • 4. 
    What is the term used to describe a fraudulent website that directs users to it?

  • Phishing
  • Pharming
  • 5. 
    What is the type of social engineering that promises goods in return for you entering your personal information?

  • Quid Pro Quo
  • Pretexting
  • Baiting
  • Phishing
  • 6. 
    Social Engineering takes advantage of which security flaw in a computer system?

  • The User
  • The Network
  • The Password
  • 7. 
    How can you protect your PIN number at a cash machine from a criminal using "shoulder surfing"?

  • Cover your pin as you enter it
  • Use the cash machine in daylight
  • Get cash back from a shop
  • 8. 
    True or False: Phishing is only done through email. It never uses any other messaging service.

  • True
  • False
  • 9. 
    What type of social engineering involves the criminal pretending to be a delivery person, and they need to be let into the building?

  • Piggybacking
  • Shoulder Surfing
  • Pretexting
  • Phishing
  • 10. 
    You hack for fun, you cause no malicious damage. You may find a bug, but you won't report it. What type of "hat" hacker are you?

  • Black
  • Grey
  • White
  • Green
  • 11. 
    What cyber scam is described by this statement - "a cyber attack intended to redirect a website's traffic to another, fake site."

  • Phishing
  • Pharming
  • DNS Hijacking
  • 12. 
    How are people targeted through Phishing?

  • via Email
  • on Websites
  • 13. 
    What cyber scam is described by this statement - " fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising as a trustworthy entity in an electronic communication."

  • Phishing
  • Pharming
  • DNS Hijacking
  • 14. 
    What type of social engineering involves the criminal to pretend to be someone they are not?

  • Quid Pro Quo
  • Baiting
  • Pretexting
  • Shoulder Surfing
  • 15. 
    You have received an email that looks like it is from your bank. It is asking for your log in details and PIN number. What type of social engineering is this?

  • Phishing
  • Pharming
  • Pretexting
  • Quid Pro Quo
  • 16. 
    How are people targeted through Pharming?

  • via Email
  • on Websites
  • 17. 
    You receive a phonecall from Microsoft Windows, saying that if you give them remote access they can upgrade your version of windows for free! What type of social engineering is this?

  • Quid Pro Quo
  • Baiting
  • Pretexting
  • Piggybacking
Report Question
warning
access_time
  Time