4.1.11 CyberDefence
Which of the following indicate the email highlighted below may be suspicious? (Select two.)
There are several spelling mistakes in the email. The link in the email is to an IP address; it is not to Microsoft's website.
Which of the following best describes a script kiddie?
A hacker who uses scripts written by much more talented individuals.
The following output was displayed using the Social Engineering Toolkit (SET). Which attack method was used to capture the user's input?
Credential harvesting attack method
Ron, a hacker, wants to gain access to a prestigious law firm he has been watching for a while. June, an administrative assistant at the law firm, is having lunch at the food court around the corner from her office. Ron notices that June has a picture of a dog on her phone. He casually walks by and starts a conversation about dogs. Which phase of the social engineering process is Ron in?
Development phase
Compliments, misinformation, feigning ignorance, and being a good listener are tactics of which social engineering technique?
Elictitation
Gathering information about a system, its components, and how they work together is known as which of the following?
Footprinting
Which of the following are tactics social engineers might use?
Moral obligation, ignorance, and threatening
Brandon is helping Fred with his computer. He needs Fred to enter his username and password into the system. Fred enters the username and password while Brandon is watching him. Brandon explains to Fred that it is not a good idea to allow anyone to watch you type in usernames or passwords. Which type of social engineering attack is Fred referring to?
Shoulder surfing
Any attack involving human interaction of some kind is referred to as which of the following?
Social engineering
You are instant messaging a coworker, and you get a malicious link. Which type of social engineering attack is this?
Spim