Lab 4-2: Social Engineering
True or False - In social engineering, the victim, who is targeted as a subject for a security breach, is aware that they are being targeted. True False
false
True or False - Using elicitation, the attacker extracts information from the victim without asking direct questions. True False
true
Which of the following components make up social engineering? (Choose all that apply). Control Manipulation Psychology Misdirection
In social engineering, the attacker psychologically manipulates the victim and misdirects to obtain the desired information.
Which of the following components can be used by the attacker in a social engineering attack? (Choose all that apply). Elicitation Manipulation Pretexting Interrogation
Social engineering is a method of extracting valuable information from a person. Without extracting the information, the attacker does not have much to start the attack with. The attacker can use any of the three components for social engineering: Elicitation Interrogation Pretexting
Identify the common targets in social engineering. (Choose all that apply). HR Department Top Management Receptionist IT Helpdesk
HR Department Top Management Receptionist IT Helpdesk