Social Media User Base Comparison
28 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which social network has the highest number of monthly active users?

  • WhatsApp
  • YouTube
  • Facebook (correct)
  • Instagram

How many monthly active users did Facebook report in the final quarter of 2022?

  • 1.3 billion
  • 2.9 billion
  • 3.7 billion (correct)
  • 2.5 billion

Which social network is owned by Meta Platforms?

  • Twitter
  • Pinterest
  • TikTok
  • Facebook (correct)

What is the number of monthly active users of WeChat?

<p>1,309 (B)</p> Signup and view all the answers

How many social media platforms owned by Meta Platforms have over one billion monthly active users each?

<p>4 (C)</p> Signup and view all the answers

What is a common technique used by attackers to trick targeted users into transferring money?

<p>Spoofing a high-level executive's email address (B)</p> Signup and view all the answers

What is the goal of an attacker who creates a domain and website claiming to be a legitimate business?

<p>To trick users into downloading malware (D)</p> Signup and view all the answers

What is the main reason why businesses cannot stop users from having a social media presence?

<p>Because these accounts are personal (B)</p> Signup and view all the answers

What is the term used to describe an attacker's attempt to trick users into thinking requests are from a legitimate business?

<p>Brand impersonation (C)</p> Signup and view all the answers

What is the potential consequence of an attacker gaining access to account credentials?

<p>Data breach (C)</p> Signup and view all the answers

What is the primary reason why social media poses a threat to businesses?

<p>Because employees disclose too much private and business information publicly (D)</p> Signup and view all the answers

What is pretexting in the context of social engineering?

<p>Creating a fake scenario to gather information (B)</p> Signup and view all the answers

What is the primary goal of phishing attacks?

<p>To steal sensitive information from victims (B)</p> Signup and view all the answers

What is the significance of a security-aware culture in protecting against social engineering attacks?

<p>It helps employees identify and repel social engineering attacks (B)</p> Signup and view all the answers

What is the purpose of two-factor authentication?

<p>To provide an additional layer of security for online accounts (A)</p> Signup and view all the answers

Why is it important to understand what information you are putting on the web for targeting at social network sites?

<p>To avoid being targeted by social engineering attacks (B)</p> Signup and view all the answers

What motivates an attacker to target businesses?

<p>For a high-stakes reward, such as monetary gains (A)</p> Signup and view all the answers

What is the purpose of reviewing LinkedIn for a list of targets?

<p>To identify high-level corporate employees and low-privilege users (C)</p> Signup and view all the answers

What can an attacker use personal information for?

<p>To guess answers to security questions or password clues (B)</p> Signup and view all the answers

What is an example of a method an attacker might use to trick an employee?

<p>Social engineering by calling an employee (C)</p> Signup and view all the answers

What is a potential password clue or answer to a security question?

<p>Both A and B (D)</p> Signup and view all the answers

What is the final step in an attacker's plan?

<p>Launching the attack using a chosen method (C)</p> Signup and view all the answers

What is the primary goal of social engineering?

<p>To secretly install spyware or trick persons into handing over sensitive information (D)</p> Signup and view all the answers

According to Siemens test, what percentage of office workers were duped by social engineering?

<p>85 percent (B)</p> Signup and view all the answers

What kind of information do social engineers often look for?

<p>Simple information about a person's life (A)</p> Signup and view all the answers

What is an example of the type of question used on secure websites?

<p>What is your first pet's name? (B)</p> Signup and view all the answers

What is a person compared to in terms of being a valuable data source?

<p>A walking computer (B)</p> Signup and view all the answers

What type of data is often targeted by social engineers?

<p>Personally identifiable data (A)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser