Threats and Vulnerabilities
SKILLSET
No description available
Related Questions
- What is NOT a social engineering attack?
- How can social engineering attacks be minimized?
- This methodology employs a number of techniques to determine the level of ‘security awareness’ that exists within the organization.
- An attacker is waiting outside an entry point where biometric authorization is required. When an authorized person or employee comes and opens the door, the attacker rushes in pretending his hands are full of heavy items. The attacker requests this authorized person to please hold open the door, who obliges allowing the attacker to enter. What type of attack has just taken place?
- Bill (a hacker) infects Erica's computer at ABC with a virus through a phishing email. After gaining access to Erica's computer, he realizes that she does not have the type of sensitive information he's looking for. However, she has a document containing contacts for services she might need (pizza delivery, plumbing, electricity etc). He edits this, and saves his contact phone number as "Mark- affordable IT services". Soon enough Erica calls Mark to complain about the virus on her computer, inviting him to fix it. What has Bill done in this scenario?
- Martin, a payroll employee at Hungry Jack receives a phone call from Stephanie who introduces her self as the IT manager at the corporate office. She informs Martin that there is a surprise inspection that will be conducted in a few hours and in order to be compliant , Martin has to download a file she emailed him immediately before the link expires to ensure his computer is inspection ready. What principle of social engineering is this?
- Any act that influences a person to take an action that may or may not be in their best interest, is known as social engineering?
- Which of the following is the most effective way to mitigate a potential social engineering attack?
- Which of these attacks focuses on testing the 'human' element of security?
- Which of the following is the least-likely physical characteristic to be used in biometric control that supports a large company?