Threats and Vulnerabilities
SKILLSET
No description available
Related Questions
- Which of the following are forms of Social Engineering?
- The CFO of Skillset.com reset his password to include 12 characters, including upper case, lower case, numbers and symbols. Although the password is meaningless and cannot be found in any dictionary, he can remember it well and does not require to write it down. He changes his password every month and is well aware of his surroundings, i.e. he ensures there is no one behind him when he types in the password. Also he never discloses his password to anyone. One day though, he found out that someone has used his password to logon to the system and modified the payroll file. What attack might the attacker have used to gain access?
- Which is the 'best' example of reverse social engineering?
- The Queensland attack is:
- People Hacking is also known as _________ attacks.
- You are entering a secured elevator and someone with their hands full with coffee or bags enters the elevator with you.
- What type of password attack will always be successful?
- When an unauthorized individual follows closely behind an authorized individual to enter into a secure area, this is an example of what?
- Which is NOT a reason for effectiveness of a social engineering attack?
- John is listening to network traffic and capturing passwords as they are sent to the authentication server. He plans to use the passwords as part of a future attack. What type of attack is this?