0
0
Intro to Computingfundamentals~20 mins

Social engineering awareness in Intro to Computing - Practice Problems & Coding Challenges

Choose your learning style9 modes available
Challenge - 5 Problems
🎖️
Social Engineering Defender
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate
2:00remaining
Identifying Social Engineering Techniques

Which of the following is NOT a common social engineering technique?

AUsing a brute force attack to guess passwords
BPretexting by pretending to be someone trustworthy
CPhishing emails that trick users into revealing passwords
DTailgating to gain physical access to restricted areas
Attempts:
2 left
💡 Hint

Think about whether the technique involves manipulating people or computers.

trace
intermediate
2:00remaining
Trace the Outcome of a Phishing Email Scenario

Imagine a user receives an email asking to reset their password by clicking a link. The link leads to a fake website. What is the most likely outcome if the user enters their password?

AThe password is safely updated on the real website
BThe password is stolen by attackers through the fake website
CThe user receives a confirmation email from their company
DThe user's computer automatically blocks the fake website
Attempts:
2 left
💡 Hint

Consider what happens when you enter sensitive info on a fake site.

identification
advanced
2:00remaining
Identify the Red Flags in a Social Engineering Call

A caller claims to be from IT support and asks for your login details to fix an urgent problem. Which of these is a red flag indicating a social engineering attempt?

AThe caller uses your real name and department
BThe caller provides a company phone number
CThe caller offers to send a follow-up email
DThe caller insists on immediate action without verification
Attempts:
2 left
💡 Hint

Think about what trustworthy support staff would or wouldn't do.

Comparison
advanced
2:00remaining
Compare Social Engineering and Technical Hacking

Which statement best explains the difference between social engineering and technical hacking?

ABoth rely only on guessing passwords without user interaction
BSocial engineering targets software vulnerabilities; technical hacking targets people
CSocial engineering tricks people to gain access; technical hacking exploits computer weaknesses
DTechnical hacking uses phone calls; social engineering uses malware
Attempts:
2 left
💡 Hint

Think about who or what each method tries to fool or attack.

🚀 Application
expert
3:00remaining
Designing a Defense Against Social Engineering

You are tasked with improving your company's defense against social engineering attacks. Which of the following measures is most effective?

ATraining employees to recognize and report suspicious requests
BBlocking all emails from unknown senders
CUsing complex passwords that change monthly
DInstalling the latest antivirus software on all computers
Attempts:
2 left
💡 Hint

Consider what helps people avoid being tricked.