0
0
Cybersecurityknowledge~10 mins

Phishing and social engineering in Cybersecurity - Interactive Code Practice

Choose your learning style9 modes available
Practice - 5 Tasks
Answer the questions below
1fill in blank
easy

Complete the sentence to identify a common phishing method.

Cybersecurity
Phishing often involves sending emails that [1] to trick users into revealing personal information.
Drag options to blanks, or click blank then click option'
Aappear legitimate
Bcome only from friends
Ccontain no links
Dare always encrypted
Attempts:
3 left
πŸ’‘ Hint
Common Mistakes
Thinking phishing emails never have links.
Believing phishing emails only come from friends.
2fill in blank
medium

Complete the sentence to explain a social engineering tactic.

Cybersecurity
Social engineering attacks often exploit [1] to manipulate victims.
Drag options to blanks, or click blank then click option'
Asoftware vulnerabilities
Bnetwork speed
Chuman trust
Dhardware failures
Attempts:
3 left
πŸ’‘ Hint
Common Mistakes
Confusing social engineering with technical hacking.
Assuming it targets only software or hardware.
3fill in blank
hard

Fix the error in the description of a phishing attack.

Cybersecurity
A phishing attack tries to steal information by pretending to be a [1] source.
Drag options to blanks, or click blank then click option'
Atrusted
Brandom
Cunknown
Dmalicious
Attempts:
3 left
πŸ’‘ Hint
Common Mistakes
Choosing 'random' or 'unknown' which do not fit phishing tactics.
Confusing the attacker’s identity with their intent.
4fill in blank
hard

Fill both blanks to complete the definition of spear phishing.

Cybersecurity
Spear phishing targets [1] individuals by using [2] information to appear convincing.
Drag options to blanks, or click blank then click option'
Aspecific
Brandom
Cpersonal
Dgeneric
Attempts:
3 left
πŸ’‘ Hint
Common Mistakes
Confusing spear phishing with general phishing.
Choosing 'random' or 'generic' which do not describe spear phishing.
5fill in blank
hard

Fill all three blanks to complete the explanation of how to avoid phishing.

Cybersecurity
To avoid phishing, always [1] suspicious emails, [2] links before clicking, and [3] sharing personal information carelessly.
Drag options to blanks, or click blank then click option'
Averify
Bcheck
Cshare
Dignore
Attempts:
3 left
πŸ’‘ Hint
Common Mistakes
Choosing 'share' personal information which increases risk.
Ignoring the need to verify emails or check links.