Lab 4-2: Social Engineering

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

True or False - In social engineering, the victim, who is targeted as a subject for a security breach, is aware that they are being targeted. True False

false

True or False - Using elicitation, the attacker extracts information from the victim without asking direct questions. True False

true

Which of the following components make up social engineering? (Choose all that apply). Control Manipulation Psychology Misdirection

In social engineering, the attacker psychologically manipulates the victim and misdirects to obtain the desired information.

Which of the following components can be used by the attacker in a social engineering attack? (Choose all that apply). Elicitation Manipulation Pretexting Interrogation

Social engineering is a method of extracting valuable information from a person. Without extracting the information, the attacker does not have much to start the attack with. The attacker can use any of the three components for social engineering: Elicitation Interrogation Pretexting

Identify the common targets in social engineering. (Choose all that apply). HR Department Top Management Receptionist IT Helpdesk

HR Department Top Management Receptionist IT Helpdesk


Ensembles d'études connexes

Principles of Accounting II, Chapter 23, McGraw Hill

View Set

Econ Exam 3 (Firms in perfect competition)

View Set

4.9: Scientific/Exponential Notation and Standard Notation (7th)

View Set

Marketing 409 (Pride): Exam 3 - Chapter 20

View Set