Social Engineering
SKILLSET
Deceiving people with malicious intent; a psychological technique.
Related Questions
- Someone from the IT department found a USB drive on the bathroom floor and it was labeled "layoffs." Should this be considered a social engineering tactic?
- It is important to not only test your company's network and external facing applications, but to also test the knowledge and awareness of employees through this type of testing using illegitimate source email addresses.
- Which is the best way to mitigate tailgating?
- A man is attempting to gain access into Medical Inc. to steal sensitive information. He calls the HR department and says he is from IT. He tells the HR representative that they have a virus and their computer is infecting the network. He adds that if he does not get access to their computer they could be fired for security noncompliance. Which social engineering principle is being used?
- Your smartcard, which is password-protected, uses a ____ factor authentication
- To find out information that can help determine the identity of an email sender, one should look into the headers of an Email. True or False?
- Matt has called at 5:00 Friday and told the IT manager he needs to create a report due Monday morning and he needs access to sensitive files. He also wants home access. What should the IT manager do? Note that Matt's direct supervisor has already left for the weekend and is unavailable. (Select 2)
- Social engineering has been used to describe a number of attacks ranging from widespread phishing for identity information to narrow pre-texting for specific records
- Jimmy is standing outside a secure entrance to a facility. He is pretending to have a tense conversation on his cell phone as an authorized employee badges in. Jimmy, while still on the phone, grabs the door as it begins to close. What just happened?
- Using your badge for entry and smart card to logon to your computer is a form of what?