Module 4˸ Social Engineering

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following statements is NOT true regarding effective measures to defend against social engineering attacks?

A good security policy can prevent people from being socially engineered.

What are the costs for a business when a user is tricked into downloading malware?

Business availability Business credibility

When an unauthorized person closely follows an authorized person into a secured area, the unauthorized person is using which technique?

Tailgating

What social engineering technique includes interception of any form of communication, including audio, video, or written?

Eavesdropping

Measures that must be taken to prevent the misuse of sensitive data would be part of which social engineering countermeasure?

Operational Guidelines

Which type of social engineering threat is accomplished through the use of intimidation, persuasion, ingratiation, or assistance?

Personal Approaches

When an attacker sends an e-mail or provides a link falsely claiming to be from a legitimate site in an attempt to acquire a user's personal or account information, the attacker is using which feature or technique?

Phishing

Which human-based social engineering technique involves an attacker masquerading as a hardware vendor?

Posing as Technical Support

Which type of social engineering compels someone to do what everyone else is doing?

Social Validation

What is the process of gaining information from people, often through deception, for the purpose of finding out about an organization's computer resources called?

Social engineering


Kaugnay na mga set ng pag-aaral

Ch. 14- The Cardiovascular System: Blood Vessels, Blood Flow, and Blood Pressure

View Set

Geography and Early Greeks Culture

View Set

10.12 Part A Segment Two Exam - Multiple-Choice

View Set

Chapter 18: The New South and The New West

View Set

Silvestri Practice Questions - Chapter 66 (Addictions)

View Set

2. Disruptive innovation and ambidexterity (Connect, Perform)

View Set

Taxonomy, Fish, Amphibians, Reptiles

View Set

Counting Atoms, Elements, and Molecules

View Set