Social Engineering
SKILLSET
Deceiving people with malicious intent; a psychological technique.
Related Questions
- What technique do intruders use to gain unauthorized access to the system by contacting users and collecting information from them?
- Martin, a payroll employee at Hungry Jack receives a phone call from Stephanie who introduces her self as the IT manager at the corporate office. She informs Martin that there is a surprise inspection that will be conducted in a few hours and in order to be compliant , Martin has to download a file she emailed him immediately before the link expires to ensure his computer is inspection ready. What principle of social engineering is this?
- An attacker sends an email to John (the CEO of a company) with a link that routes to a malicious website. What type of attack is going on?
- Which of the following are examples of implementing physical security (and not social engineering) ? (Select three.)
- When using non-technical assessment methods to assess the security of an organization, which of the following techniques would be best for determining end-user security training requirements?
- You found a flash drive in front of your company, it seem to be no one will claim, what should you do?
- Jimmy is standing outside a secure entrance to a facility. He is pretending to have a tense conversation on his cell phone as an authorized employee badges in. Jimmy, while still on the phone, grabs the door as it begins to close. What just happened?
- Someone sends you an email from Nigeria, asking for you to help transfer them some money into your account. That's an example of which of the following? Check all that apply.
- Shoulder surfing can be performed remotely by the hacker
- Targeted phasing emails that appear to be from trusted coworkers are a common attack vectors for both white hat and black hat hackers to gain access.