When attempting to obtain someone's information, social engineering tactics are usually utilized less than simply hacking someone's software.
True
False
3. Multiple Choice
45 seconds
1 pt
What is the goal of social engineering?
Sabotage a person's social media
To gain vital personal information
To catfish someone
To build trust
4. Multiple Choice
45 seconds
1 pt
Spammers want you to:
Not open any links
Think first and act later
Act first and think later
Update your software automatically
5. Multiple Choice
30 seconds
1 pt
Who is the founder and CEO of KnowBe4, LLC, which hosts the world's most popular integrated Security Awareness Training and Simulated Phishing platform?
Kevin Mitnick
Stu Sjouwwerman
6. Multiple Choice
45 seconds
1 pt
An email claiming that you have won the lottery, as long as you fill out the corresponding information, is an example of what type social engineering attack?
Baiting
Phishing
Piggybacking
Email from a friend
7. Multiple Choice
30 seconds
1 pt
In 2013, how much money was lost due to phishing scams alone (in billion U.S. dollars)?
$5.9
$5.2
$7.9
$6.4
8. Multiple Choice
45 seconds
1 pt
Definition: Social engineering is the art of manipulating people so they give up confidential information.
True
False
9. Multiple Choice
45 seconds
1 pt
Which of the following are examples of social engineering scams executed via phishing?
Banking Link Scams
Fax Notice Scams
Facebook Message Link Scams
All of the above
10. Multiple Choice
30 seconds
1 pt
Which person is known as the "World's Most Famous Hacker?"
Kevin Mitnick
Stu Sjouwerman
11. Multiple Choice
30 seconds
1 pt
In 2013, how much money was generated from data theft (in billion U.S. dollars)?
$91
$172
$127
$143
12. Multiple Choice
45 seconds
1 pt
Which of these is how to properly avoid becoming a victim of social engineering?
Research the facts
Delete any request for financial information or passwords
Reject requests for help
All of the above
13. Multiple Choice
45 seconds
1 pt
What month is National Cyber Security month?
February
October
April
August
14. Multiple Choice
45 seconds
1 pt
What is piggybacking?
Trawling parking lots for goods
Creating pretext or false stories to gain information
Sending legitimate emails to people
Following employees into restricted areas
15. Multiple Choice
30 seconds
1 pt
What percentage of data breaches come from phishing?