Would this incident be an example of social engineering?

Question # 00101908 Posted By: echo7 Updated on: 09/09/2015 09:11 PM Due on: 10/09/2015
Subject Computer Science Topic General Computer Science Tutorials:
Question
Dot Image

Question 1

Points: 10 out of 10

Would this incident be an example of social engineering?

Finding a music CD on the subway and playing it on your computer

  1. Yes
  2. No


Question 2

Points: 0 out of 10

Would this incident be an example of social engineering?

You are working as a receptionist at a real estate company. You receive a phone call from one of the agents who asks for the email address of another agent he needs to contact.

  1. Social engineering
  2. Not social engineering


Question 3

Points: 0 out of 10

Would this incident be an example of social engineering?

Someone calling to get your full name for an event registration

  1. Yes
  2. No


Question 4

Points: 10 out of 10

True or false? Malware problems and other compromises of your computer information are rare.

  1. True
  2. False


Question 5

Points: 10 out of 10

Would this incident be an example of social engineering?

You receive a phone call from the technical support department of a software maker alerting you to a bug in the company’s software, which you have purchased. The tech offers to walk you through the steps required to fix the software on your computer.

  1. Social engineering
  2. Not social engineering


Question 6

Points: 10 out of 10

Which of the following is generally not considered PII?

  1. Your driver license number
  2. Your bank account number
  3. Your library card number
  4. Your social security number

Feedback

Correct. The number on your library card would not generally be PII.

Question 7

Points: 10 out of 10

Can the following action be a result of your PII being compromised?

Having your identity stolen

  1. Yes
  2. No


Question 8

Points: 10 out of 10

Which of the following measures is least likely to help you protect your PII?

  1. Logging off or shutting down your computer when it’s not in use
  2. Locking your computer in the back of your car knowing that your car has an alarm
  3. Keeping the “remember me” button checked on a social networking site


Question 9

Points: 10 out of 10

Identify whether the following actions pose a risk of becoming a phishing victim or do not pose a risk. Ann receives an email telling here that a friend has sent her an electronic greeting card. She clicks on a rather long url to retrieve the card.

  1. Risk of becoming a phishing victim
  2. Not a risk of becoming a phishing victim


Question 10

Points: 10 out of 10

Indicate whether the following actions are the actions of a person who will be a victim, or will not be a victim, of phishing attacks.

Clicking on a link to the URL https://www.g00gle.com

  1. Phishing victim
  2. Not a phishing victim


Question 11

Points: 10 out of 10

Which of the following email scenarios is more likely than the others to involve phishing?

  1. An email sent to multiple recipients
  2. An email from someone you know
  3. An email containing a clickable url
  4. An email that goes to your email program’s spam folder


Question 12

Points: 10 out of 10

Identify whether the following actions pose a risk of becoming a phishing victim or do not pose a risk. Using a computer in his college’s open lab, Oscar orders a textbook he needs from an online vendor by typing in their url, and he uses his credit card to pay for the order.

  1. Risk of becoming a phishing victim
  2. Not a risk of becoming a phishing victim


Question 13

Points: 10 out of 10

For the following scenario, indicate whether the actions are good practices or bad practices to safeguard your personally identifiable information.

Marina’s personal computer requires a password to get access.

  1. Good practice
  2. Bad practice


Question 14

Points: 10 out of 10

For the following scenario, indicate whether the actions are good practices or bad practices to safeguard your personally identifiable information.

Anthony has spent time developing a super secure password. He now uses it for all his accounts.

  1. Good practice
  2. Bad practice


Question 15

Points: 10 out of 10

You receive an email whose title line looks suspicious. Which of the following actions is the safest?

  1. Clicking an “unsubscribe’ link in the email
  2. Deleting the email without opening
  3. Googling the site the email is coming from
  4. Putting the site in your spam filter rules so you don’t receive any more emails

Dot Image
Tutorials for this Question
  1. Tutorial # 00096281 Posted By: echo7 Posted on: 09/09/2015 09:11 PM
    Puchased By: 3
    Tutorial Preview
    The solution of Would this incident be an example of social engineering?...
    Attachments
    MD_University_College_IFSM_201_Quiz_5_(2015).docx (63.3 KB)
    Recent Feedback
    Rated By Feedback Comments Rated On
    k...ah Rating Comfortable and cheap services 05/03/2016

Great! We have found the solution of this question!

Whatsapp Lisa