Question
A social engineer uses various deceptive practices to convince the targeted person to divulge information they normally would not divulge or to convince the target
A social engineer uses various deceptive practices to convince the targeted person to divulge information they normally would not divulge or to convince the target of the attack to do something they normally wouldnt do.
|
| True |
|
| False |
A user installs unauthorized communication software on a modem allowing her to connect to her machine at work from home via that modem. What outcome may result from this action?\
|
| A rogue access point may be created. | ||||||||||||
|
| A DNS spoofing attack may occur. | ||||||||||||
|
| A vishing attack may occur. | ||||||||||||
|
Shoulder surfing occurs when the attacker simply looks over the shoulder of a user at work, watching as a coworker enters their password.
True
False | A man trap may occur.
|
Dumpster diving occurs when a hacker gains access to a computer and tries to recover files from the recycle bin in the hopes of finding privileged information.
|
| True |
|
| False
|
Phishing is the most common form of social engineering attack related to computer security.
|
|
|
| true or false |
|
Setting up a rogue access point is a good way to prevent social engineering attacks.
True
False
A user receives an e-mail warning of a dangerous computer virus and instructing the user to delete files it claims were put there by the virus. However, the files are actually critical system files. Which term describes this scenario?
Social engineering
Reverse social engineering
A hoax
Phishing
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started