Social Engineering
SKILLSET
Deceiving people with malicious intent; a psychological technique.
Related Questions
- Social Engineering can be used when planning to hack a wireless network
- Matt has called at 5:00 Friday and told the IT manager he needs to create a report due Monday morning and he needs access to sensitive files. He also wants home access. What should the IT manager do? Note that Matt's direct supervisor has already left for the weekend and is unavailable. (Select 2)
- Mark goes to Tom's office to ask for a document. While Tom is busy searching his cabinets for the document, Mark can see an open spreadsheet on Tom's computer displaying personal information about employees. What has Mark just done?
- Your smartcard, which is password-protected, uses a ____ factor authentication
- This methodology employs a number of techniques to determine the level of ‘security awareness’ that exists within the organization.
- Which of the following is NOT a form of social engineering attacks?
- It is important to not only test your company's network and external facing applications, but to also test the knowledge and awareness of employees through this type of testing using illegitimate source email addresses?
- Looking over someone's shoulder in order to gather the username, password or other secret information is a technique called _______?
- Which of the following is a low tech way of gaining unauthorized access to systems?
- What term applies when an attacker uses a person’s personal details to increase their credibility?