Exam Compass - Social Engineering Quiz Flashcards

1
Q

A social engineering technique whereby attackers under disguise of a legitimate request attempt to gain access to confidential information is called:
Phishing
Privilege escalation
Backdoor access
Shoulder surfing

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The practice of using a telephone system to manipulate user into disclosing confidential information is known as:
Whaling
Spear phishing
Vishing
Pharming

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A situation in which an unauthorized person can view another user’s display or keyboard to learn their password or other confidential information is referred to as:
Spear phishing
Tailgating
Shoulder surfing
Spoofing

A

Shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Phishing scams targeting people holding high positions in an organization or business are known as:
Vishing
Smishing
Whaling
Pharming

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is tailgating?
Acquiring unauthorized access to confidential data
Looking over someone’s shoulder to get information
Gaining unauthorized access to restricted areas by following another person
Manipulating a user into disclosing confidential information

A

Gaining unauthorized access to restricted areas by following another person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which social engineering attack relies on identity theft?
Vishing
Impersonation
Elicitation
Confidential bait

A

Impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In computer security, the term “Dumpster diving” is used to describe a practice of sifting through trash for discarded documents containing sensitive data. Found documents containing names and surnames of the employees along with the information about positions held in the company and other data can be used to facilitate social engineering attacks. Having the documents shredded or incinerated before disposal makes dumpster diving less effective and mitigates the risk of social engineering attacks.
True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The term “Evil twin” refers to a rogue Wireless Access Point (WAP) set up for eavesdropping or stealing sensitive user data. Evil twin replaces the legitimate access point and by advertising its own presence with the same SSID appears as a legitimate access point to connecting hosts.
True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly