Answered step by step
Verified Expert Solution
Link Copied!
Question
1 Approved Answer

1. You received an email from your Professor that said there was a surprise pop quiz, which was to be completed as soon as possible,

1.  You received an email from your Professor that said there was a surprise pop quiz, which was to be completed as soon as possible, or you would not be able to take it at all and get a zero. There was a link to click on for you to enter your username and password. Students who clicked on this link and entered their username and password were locked out of their accounts. The accounts were later recovered. The UH ITS (Information Technology Services) reported that the accounts were used by attackers to send spam. What kind of social engineering strategy does this attack NOT use?
    A.     Authority
    B.     Consensus
    C.     Intimidation
    D.     Urgency

2.  Your coworker throws away all his documents, but never shreds them. What kind of potential attack could happen from this?
    A.     zero day exploit
    B.     dumpster diving
    C.     phishing
    D.     privilege escalation

3.  UH email often adds “[CAUTION EXTERNAL EMAIL]” to the beginning of the subject line to let users know to be cautious about email from outside UH.
    A.     pretexting
    B.     reconnaissance
    C.     credential harvesting
    D.     prepending

4.  You get an email from Mickey Mouse about a free trip for two to Walt Disney World. You just have to forward the email to 10 people. What kind of attack does this describe?
    A.     shoulder surfing
    B.     tailgating
    C.     dumpster diving
    D.     hoax

5.  What is a technique for eliciting information from someone?
    A.     tailgating
    B.     shoulder surfing
    C.     pharming
    D.     false statements

6.  _____ redirects a user from a legitimate website to a malicious website by changing hosts files on the victim's computer or on a DNS server.
    A.     pharming
    B.     vishing
    C.     smishing
    D.     spear phishing

7.  _____ is sending fake text messages to trick you into giving up personal information
    A.     vishing
    B.     watering hole attack
    C.     smishing
    D.     phishing

8.  _____ is usually the first step in a social engineering attack.
    A.     hoax
    B.     prepending
    C.     reconnaissance
    D.     invoice scam

9.  _____ is any act that influences a person to take an action that may or may not be in their best interest.
    A.     cryptographic attacks
    B.     social engineering
    C.     application attacks
    D.     wireless attacks

10.  _____ is unsolicited Instant Messaging (IM) sent indiscriminately in bulk, often for commercial purposes.
    A.     SPIM
    B.     phishing
    C.     smishing
    D.     spam

Step by Step Solution

There are 3 Steps involved in it

Step: 1

ANSWER IS B Consensus This attack does not rely on creating a sense of agreement or conformity among ... blur-text-image
Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Managerial Communication Strategies and Applications

Authors: Geraldine E. Hynes

6th edition

1483358550, 978-1483358550

More Books

Students explore these related Programming questions