Social Engineering
SKILLSET
Deceiving people with malicious intent; a psychological technique.
Related Questions
- It is important to not only test your company's network and external facing applications, but to also test the knowledge and awareness of employees through this type of testing using illegitimate source email addresses.
- An attacker is waiting outside an entry point where biometric authorization is required. When an authorized person or employee comes and opens the door, the attacker rushes in pretending his hands are full of heavy items. The attacker requests this authorized person to please hold open the door, who obliges allowing the attacker to enter. What type of attack has just taken place?
- Which of the following are examples of implementing physical security (and not social engineering) ? (Select three.)
- Which of the following can be impacted by a social engineering attack? (Choose 3)
- Mark goes to Tom's office to ask for a document. While Tom is busy searching his cabinets for the document, Mark can see an open spreadsheet on Tom's computer displaying personal information about employees. What has Mark just done?
- Phishing is a combinations of social engineering and _____?
- Information gathered from social networking sites such as facebook, linkedin, twitter etc, can be used for which types of attacks? (Choose two)
- Which of the following is a low tech way of gaining unauthorized access to systems?
- Targeted phasing emails that appear to be from trusted coworkers are a common attack vectors for both white hat and black hat hackers to gain access.
- All are examples of social engineering EXCEPT: