Phishing and Social Engineering

Description: Test your knowledge on Phishing and Social Engineering techniques used by attackers to trick people into giving up sensitive information or access to systems.
Number of Questions: 15
Created by:
Tags: phishing social engineering cybersecurity
Attempted 0/15 Correct 0 Score 0

Which of the following is NOT a common type of phishing attack?

  1. Spear phishing

  2. Whaling

  3. Smishing

  4. Vishing


Correct Option: C
Explanation:

Smishing is a type of phishing attack that uses SMS or text messages to trick people into giving up sensitive information.

What is the primary goal of social engineering attacks?

  1. To steal sensitive information

  2. To gain access to computer systems

  3. To disrupt business operations

  4. To damage reputation


Correct Option: A
Explanation:

Social engineering attacks are designed to trick people into giving up sensitive information, such as passwords, credit card numbers, or social security numbers.

Which of the following is NOT a common social engineering technique?

  1. Pretexting

  2. Baiting

  3. Tailgating

  4. Quid pro quo


Correct Option: D
Explanation:

Quid pro quo is a type of social engineering attack in which the attacker offers something of value in exchange for sensitive information.

What is the best way to protect yourself from phishing attacks?

  1. Never click on links in emails or text messages from unknown senders

  2. Be suspicious of emails or text messages that ask for personal information

  3. Use strong passwords and change them regularly

  4. All of the above


Correct Option: D
Explanation:

All of the above are important steps to take to protect yourself from phishing attacks.

Which of the following is NOT a common red flag of a phishing email?

  1. The email address of the sender does not match the domain of the company it claims to be from

  2. The email contains grammatical errors or typos

  3. The email asks for personal information, such as passwords or credit card numbers

  4. The email contains a link to a website that looks legitimate, but is actually a fake website designed to steal your information


Correct Option: D
Explanation:

This is a common red flag of a phishing email, but it is not always present.

What should you do if you think you have been the victim of a phishing attack?

  1. Contact your bank or credit card company immediately

  2. Change your passwords immediately

  3. Report the attack to the Federal Trade Commission (FTC)

  4. All of the above


Correct Option: D
Explanation:

All of the above are important steps to take if you think you have been the victim of a phishing attack.

Which of the following is NOT a common social engineering attack vector?

  1. Email

  2. Phone

  3. Social media

  4. In-person


Correct Option: D
Explanation:

In-person social engineering attacks are less common than other vectors, such as email or phone.

What is the best way to protect yourself from social engineering attacks?

  1. Be aware of the different types of social engineering attacks

  2. Be suspicious of unsolicited requests for personal information

  3. Never give out personal information over the phone or email

  4. All of the above


Correct Option: D
Explanation:

All of the above are important steps to take to protect yourself from social engineering attacks.

Which of the following is NOT a common social engineering technique used in phishing attacks?

  1. Pretexting

  2. Baiting

  3. Tailgating

  4. Shoulder surfing


Correct Option: D
Explanation:

Shoulder surfing is a technique used to steal information by looking over someone's shoulder while they are using a computer or mobile device.

What is the best way to protect yourself from shoulder surfing attacks?

  1. Be aware of your surroundings when using a computer or mobile device

  2. Use a privacy screen filter on your computer or mobile device

  3. Be careful about what information you display on your computer or mobile device screen

  4. All of the above


Correct Option: D
Explanation:

All of the above are important steps to take to protect yourself from shoulder surfing attacks.

Which of the following is NOT a common type of phishing attack that targets businesses?

  1. Spear phishing

  2. Whaling

  3. Business email compromise (BEC)

  4. Smishing


Correct Option: D
Explanation:

Smishing is a type of phishing attack that uses SMS or text messages to trick people into giving up sensitive information. It is not as common as other types of phishing attacks that target businesses.

What is the best way to protect your business from phishing attacks?

  1. Educate your employees about phishing attacks

  2. Implement a strong email security solution

  3. Use multi-factor authentication (MFA) for all accounts

  4. All of the above


Correct Option: D
Explanation:

All of the above are important steps to take to protect your business from phishing attacks.

Which of the following is NOT a common social engineering technique used in whaling attacks?

  1. Pretexting

  2. Impersonation

  3. Baiting

  4. Tailgating


Correct Option: D
Explanation:

Tailgating is a technique used to gain unauthorized access to a building or facility by following someone who has authorized access.

What is the best way to protect yourself from whaling attacks?

  1. Be suspicious of unsolicited emails or phone calls from people you don't know

  2. Never give out personal or financial information over the phone or email

  3. Be careful about what information you post on social media

  4. All of the above


Correct Option: D
Explanation:

All of the above are important steps to take to protect yourself from whaling attacks.

Which of the following is NOT a common social engineering technique used in BEC attacks?

  1. Pretexting

  2. Impersonation

  3. Baiting

  4. Vishing


Correct Option: D
Explanation:

Vishing is a type of phishing attack that uses voice calls to trick people into giving up sensitive information.

- Hide questions