/
Browse
/
Learning Journeys
/
Introducing Cybersecurity
/
Understanding Social Engineering and Social Media
Introducing Cybersecurity
Welcome to the Training
1 min
Cybersecurity Threats and Threat Actors
5 mins
Quiz
Understanding Social Engineering and Social Media
Securing Mobile Devices, Communication, and Passwords
Understanding AI in Cybersecurity
Knowledge quiz
It's time to put what you've learned to the test, get 4 right to pass this unit.
1.
What is phishing?
Choose the correct answer.
An antivirus software
A common type of social engineering tactic often done through e-mail or messaging apps
A computer programming language
2.
What can happen if you fall for a phishing scam?
There are two correct answers.
Your files can be encrypted and locked, requiring you to pay a ransom to get access back.
You can gain access to someone else's private information.
It can install harmful software on your device that can steal your private information.
3.
How can you use social media more securely?
Choose the correct answer.
Share your location regularly to let people know where you are.
Use a simple, easy-to-remember password for all your social media accounts.
Regularly check your privacy settings and limit the amount of information you share and use strong passwords.
4.
Which of these features belong to a social engineering message?
There are three correct answers.
A sense of urgency
An unknown sender
A message with an attachment
An unexpected request
A message received in the middle of the night
5.
What does a social engineering threat actor use to get what they need?
Choose the correct answer.
Software hacking techniques
Physical force
Psychological tactics