0
0
Cybersecurityknowledge~20 mins

Phishing and social engineering in Cybersecurity - Practice Problems & Coding Challenges

Choose your learning style9 modes available
Challenge - 5 Problems
🎖️
Phishing and Social Engineering Master
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate
2:00remaining
Understanding Phishing Techniques

Which of the following best describes a common method used in phishing attacks?

APhysically breaking into a building to steal computers
BUsing software to scan for open Wi-Fi networks
CSending an email that appears to be from a trusted source asking for personal information
DInstalling antivirus software on a computer
Attempts:
2 left
💡 Hint

Think about how attackers trick people into giving away sensitive data.

📋 Factual
intermediate
2:00remaining
Identifying Social Engineering Examples

Which of the following is an example of social engineering?

AA hacker exploiting a software vulnerability to gain access
BAn attacker calling an employee pretending to be IT support to get their password
CUsing a brute force attack to guess a password
DInstalling malware through a malicious website
Attempts:
2 left
💡 Hint

Social engineering involves manipulating people rather than technology.

🔍 Analysis
advanced
2:00remaining
Analyzing Phishing Email Characteristics

Which feature in an email is most likely a sign of a phishing attempt?

AAn email with urgent language asking to verify account details via a suspicious link
BAn email confirming a recent purchase you made
CAn email from a known contact with a personalized greeting
DAn email with proper grammar and no links
Attempts:
2 left
💡 Hint

Phishing emails often try to create a sense of urgency and ask for sensitive info.

Comparison
advanced
2:00remaining
Comparing Phishing and Spear Phishing

What is the main difference between phishing and spear phishing attacks?

APhishing requires malware; spear phishing does not
BPhishing uses phone calls; spear phishing uses emails only
CPhishing is legal; spear phishing is illegal
DPhishing targets many people broadly; spear phishing targets specific individuals or organizations
Attempts:
2 left
💡 Hint

Consider how attackers choose their victims in each case.

Reasoning
expert
2:00remaining
Evaluating Defense Strategies Against Social Engineering

Which defense strategy is most effective in reducing the risk of social engineering attacks?

ATraining employees to recognize and report suspicious requests
BRegularly updating software to patch vulnerabilities
CInstalling firewalls to block unauthorized network access
DUsing strong passwords for all accounts
Attempts:
2 left
💡 Hint

Think about how social engineering exploits human behavior.