Module 4 quiz - social engineering attacks

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following is not a motivation technique used by social engineers?

A phishing campaign using whaling

Which of the following is not true about elicitation an interrogation?

And interrogator cannot use closed ended questions to gain more control of the conversation.

Which of the following is true about interrogation?

And interrogator pays attention to the victims posture body language skin color and Eye movement

In a _________ attack, A user visits a legitimate website and clicks on a malicious ad. Then the user is redirected to a malicious site and downloads malware.

Malvertising

Which of the following refers to the act of incorporating malicious ads on trusted websites, which results in users browsers being in advertently redirected to sites hosting malware?

Malvertising

Which of the following is not true about pharming?

Pharming can be done by exploiting a buffer overflow using Windows Powershell.

Which of the following is the term for an attacker presenting to a user a link or an attachment that looks like a valid, trusted resource?

Phishing

Which of the following is true about pretexting

Pretexting Or impersonation involves presenting yourself there's someone else in order to gain access to information

Which of the following is an example of a social engineering attack that is not related to email?

SMS phishing

Which of the following is true about social engineering motivation techniques?

Scarcity can be used to create a feeling of urgency in a decision making context. It is possible to use specific language in an interaction to present a sense of urgency and manipulate the victim

Which of the following involves obtaining information such as personally identifiable information (PII), passwords, and other confidential data by looking at someone's laptop, desktop, or mobile device screen?

Shoulder surfing

_______ is phishing attempts that are constructed in a very specific way and directly targeted to specific individuals or companies.

Spear phishing

Which of the following is true about spear phishing?

Spear phishing is phishing attempts that are constructed in a very specific way and directly targeted to specific individuals or companies

Which of the following is not true?

The main goal in all mass mail attacks, including whaling, is to steal sensitive information or compromise the victim system and then target other key high profile victims.

Which of the following is not true about USB key drop attacks?

USB key drop attacks are not effective anymore

Which of the following is true about voice phishing?

Voice phishing is also referred to as "vishing"

Which of the following is not true about whaling?

Whaling attacks use DNS poisoning to impersonate a legitimate website.

Which of the following is true?

Whaling is similar to phishing and spear phishing


Ensembles d'études connexes

Midterm 2/13/21 Red Flags &TherEx

View Set

Alta - Chapter 7 - The Central Limit Theorem - Part 1

View Set

B Intro to IT unit 4 algorithms assignment

View Set

18.3 Cloud types and precipitation

View Set

референтные величины бх белки ферменты

View Set