0
0
Intro to Computingfundamentals~5 mins

Social engineering awareness in Intro to Computing - Cheat Sheet & Quick Revision

Choose your learning style9 modes available
Recall & Review
beginner
What is social engineering in the context of cybersecurity?
Social engineering is a trick used by attackers to manipulate people into giving away confidential information or access, often by pretending to be someone trustworthy.
Click to reveal answer
beginner
Name three common social engineering techniques.
Phishing (fake emails or messages), Pretexting (creating a fake story to gain trust), and Tailgating (following someone into a secure place without permission).
Click to reveal answer
beginner
Why is it important to verify the identity of someone asking for sensitive information?
Because attackers often pretend to be trusted people to trick you. Verifying identity helps prevent giving access or information to the wrong person.
Click to reveal answer
beginner
What should you do if you receive an unexpected email asking for your password?
Do not reply or click any links. Instead, contact the person or company directly using a known phone number or website to check if the request is real.
Click to reveal answer
beginner
How can regular training help prevent social engineering attacks?
Training teaches people to recognize tricks and suspicious behavior, so they can avoid falling for scams and protect themselves and their organization.
Click to reveal answer
Which of the following is an example of social engineering?
AA firewall blocking unauthorized access
BA computer virus spreading automatically
CA software update notification
DAn email pretending to be your bank asking for your password
What is 'phishing'?
AInstalling antivirus software
BPhysically stealing a computer
CSending fake messages to steal information
DBacking up data regularly
If someone you don’t know asks for your login details, what should you do?
AGive them the details quickly
BIgnore and report the request
CShare only part of the details
DAsk them to call back later
Tailgating in social engineering means:
AFollowing someone into a secure area without permission
BSending fake emails
CHacking a password
DInstalling malware
Why should you be cautious about clicking links in unexpected emails?
AThey might lead to fake websites that steal your info
BThey always contain useful information
CThey help speed up your computer
DThey are safe if the email looks professional
Explain what social engineering is and give two examples of how attackers use it.
Think about how people are tricked rather than technical hacks.
You got /2 concepts.
    Describe three ways you can protect yourself from social engineering attacks.
    Focus on actions you can take when someone asks for sensitive info.
    You got /3 concepts.